Which Check Point products are affected?
Any product installed on Microsoft Windows is affected by this vulnerability, as the vulnerability is in the operating system's security API. This affects certificate validation of binary files, web sites visited, and more.
Affected applications (due to the fact that they are installed and based on Microsoft Windows) include (but are not limited to) Check Point Endpoint Security Client for Windows, Endpoint Security VPN (the client side), Identity Awareness Windows client, SmartConsole and ZoneAlarm.
What should I do to protect myself?
Update your Microsoft Windows operating systems. There is no need for a software update from Check Point.
In general, follow Microsoft's recommendations for updates as mentioned in their advisory: CVE-2020-0601 | Windows CryptoAPI Spoofing Vulnerability
Are there any Check Point protections against this?
Yes. There are dedicated Check Point SandBlast Network and IPS protections focusing on blocking relevant attack attempts.
Which Check Point products are not affected?
Check Point Security Gateway, Security Management, and all other products that are not installed on Microsoft Windows.
This solution has been verified for the specific scenario, described by the combination of Product, Version and Symptoms. It may not work in other scenarios.