Support Center > Search Results > SecureKnowledge Details
Check Point response to IPMI vulnerabilities Technical Level
  • On July 26, 2013 US-CERT published alert TA13-207A: "Risks of Using the Intelligent Platform Management Interface (IPMI)" reporting on vulnerabilities that may affect systems using IPMI.

  • IPMI is used in Check Point appliances for Lights Out Management (LOM) card.

  • This article describes exposure of each Check Point appliance and proposed solution.


The LOM firmware versions mentioned in the table below are not vulnerable to the alert above.

If the current LOM firmware version on your device is not mentioned in the table below, you are advised to upgrade the LOM firmware.

Appliance Model LOM firmware version
4800 1.35 or above
12200 1.35 or above
12400 / 12600 1.35 or above

any release

21400 0.76 or above
except 1.4
21600 / 21700

R77.10 and above: 1.24 or above
R77 and below: 1.22

Smart-1 25 3.31 or above
Smart-1 25B 3.31 or above
Smart-1 50 3.31 or above
Smart-1 150 3.31 or above
Smart-1 225 2.00 b11 or above
Smart-1 3050 2.00 b11 or above
Smart-1 3150 2.00 b11 or above
Power-1 1.0.083 or above
Data Center Security Appliances 61000 any release (1)
IAS M-Series Appliances
(Powered by IBM):
  • IBM System X x3550 M3, M4
  • IBM System X x3650 M3, M4
Refer to IBM Security Bulletin
IAS D-Series Appliances
(powered by HP):
  • HP ProLiant DL120 G7
  • HP ProLiant DL320e G8
  • HP ProLiant DL360 G7, G8
  • HP ProLiant DL380 G7, G8
Refer to HP Security Bulletin
(Document ID: c03844348)


  1. IPMI interface on Data Center Security Appliance 61000 is not exploitable because it is accessible only from the internal chassis network.
This solution is about products that are no longer supported and it will not be updated

Give us Feedback
Please rate this document