These Check Point environments are affected by applying the Microsoft hardening changes in response to CVE-2021-26414:
- Environments with AD Query configured as an Identity Source
- Environments with the Identity Logging feature enabled
Check Point AD Query and Identity Logging features query the Microsoft Active Directory Security Event Logs, and then extract user and computer information that maps to an IP address. This process is based on Windows Management Instrumentation (WMI). WMI is based on DCOM/RPC.
In the Microsoft Knowledge Base article KB5004442, Microsoft released hardening changes that enforce a higher level of authentication for DCOM traffic.
The new hardening changes interfere with the Check Point AD Query operation.
Microsoft is releasing the hardening changes in these phases:
Phase |
Planned Date |
Description |
Phase 1 |
June 2021 (*) |
Hardening changes are disabled by default, but with the ability to enable them.
|
Phase 2 |
June 2022 (*) |
Hardening changes are enabled by default, but with the ability to disable them.
|
Phase 3
|
March 2023 (*)
|
Hardening changes are enabled by default, without the ability to disable them.
By this point, you must resolve any compatibility issues with the hardening changes and applications in your environment.
|
(*) For exact dates, see KB5004442.
Background
Check Point recommends to use Identity Collector as the identity source instead of AD Query. For more information, see:
You can follow KB5004442 on your DC servers and use Identity Collector as the identity source because these hardening changes do not interfere with the Identity Collector operation.
To apply the Microsoft hardening and continue using AD Query and Identity Logging, you must install a hotfix.
Important Notes:
-
Environments with AD Query configured as an Identity Source (the process runs on the Security Gateway) - Install the fix on the Security Gateway.
While configuring AD Query in the Identity Awareness Configuration wizard, the connectivity test fails in this specific case:
- SmartConsole runs on Windows 7.
- There is no Access Control policy on the Security Gateway.
- Microsoft hardening is enabled on the domain controller.
-
Environments with the Identity Logging feature enabled (the process runs on the Security Management) - Install the fix on the Management Server.
While configuring Identity Logging in the configuration wizard, the connectivity test fails in this specific case:
- SmartConsole runs on Windows 7.
- Microsoft hardening is enabled on the domain controller.
Fix Availability
The hotfix is included in Jumbo Hotfix Accumulators for these supported versions of Security Gateways / Security Management / Multi-Domain Servers:
Fix Availability for Quantum Spark Appliances
The hotfix is included in these supported versions:
Important Notes for Environments where the Hotfix is not Installed
- The setting documented in KB5004442 does not remove the alerts from the domain controller, but it does restore the traffic flow.
- If you do not enable the new setting documented in KB5004442 (while this is still possible), you can continue working with AD Query.
This makes your Windows server vulnerable to CVE-2021-26414.