CVE-2008-5849
mediumCVSS v3 Base Score
5.0
AV:N/AC:L/Au:N/C:P/I:N/A:N
EPSS Score
0.5%
Exploitation probability in 30 days
Top 33% most likely to be exploited
Attack Characteristics
Attack Vector
Network
Attack Complexity
Low
Confidentiality
P
Integrity
None
Availability
None
Published: January 6, 2009 (6336 days ago)
Last Modified: April 23, 2026
Vendor: Check Point
Source: NVD
Vulnerability Report
Generated by CyberWatcher
Description
Check Point VPN-1 R55, R65, and other versions, when Port Address Translation (PAT) is used, allows remote attackers to discover intranet IP addresses via a packet with a small TTL, which triggers an ICMP_TIMXCEED_INTRANS (aka ICMP time exceeded in-transit) response containing an encapsulated IP packet with an intranet address, as demonstrated by a TCP packet to the firewall management server on port 18264.
CWE
CWE-200Affected Products
checkpoint vpn-1