Check Point response to "Check Point Connection Table Leakage"
This is not a vulnerability, rather a wrong configuration. The cluster synchronization network is considered to be trusted and protected.
To assure that the Synchronization network is indeed protected, customers are advised to use a dedicated physical network segment or VLANs.
Refer to ClusterXL Administration Guide (R55, R60, R61, R62, R65, R70, R70.1, R71, R75, R75.20, R75.40, R75.40VS, R76, R77) - Chapter 2 'Synchronizing Connection Information Across the Cluster' - The Synchronization Network.
In addition, refer to sk25977 - Connecting multiple clusters to the same network segment (same VLAN, same switch).
Check Point thanks Munis Badar for responsible disclosure of this issue.
This solution is about products that are no longer supported and it will not be updated