This article applies to all Check Point software products, unless stated otherwise for specific CVE.
Note: This article does not list all the known CVEs for OpenSSL - only those that were explicitly checked by Check Point.
Clarifications:
Status |
Meaning |
Not relevant |
- Either Check Point does not use the vulnerable code.
- Or Check Point does not have this code in released versions.
- Or Check Point changed the code in such a way that this vulnerability does not apply anymore.
|
Not vulnerable |
- The issue is not relevant to Check Point code (the affected code does not exist or is not used in Check Point software).
- The issue was relevant to Check Point code and Check Point has already fixed it.
|
Relevant |
- The issue exists in Check Point code.
|
How to check the version of the installed OpenSSL package:
[Expert@HostName:0]# cpopenssl version
Example:
[Expert@Gateway_172.29.19.156:0] # cpopenssl version
OpenSSl 1.1.1k 25 Mar 2021
[Expert@Gateway_172.29.19.156:0] #
Notes:
- "cpopenssl version" command is supported in R80.40 and higher Check Point versions.
- All Check Point versions starting from R80.40 are protected and include all relevant CVE fixes.
Applies To:
- This SK replaces sk101171