Check Point Software Ssl Network Extender
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Check Point Software Ssl Network Extender.
By the Year
In 2026 there have been 0 vulnerabilities in Check Point Software Ssl Network Extender. Ssl Network Extender did not have any published security vulnerabilities last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 0 | 0.00 |
| 2024 | 0 | 0.00 |
| 2023 | 0 | 0.00 |
| 2022 | 1 | 7.50 |
| 2021 | 1 | 5.30 |
It may take a day or so for new Ssl Network Extender vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Check Point Software Ssl Network Extender Security Vulnerabilities
Cisco SNX bruteforce login vulnerability on IPsec VPN blade
CVE-2022-23746
7.5 - High
- November 30, 2022
The IPsec VPN blade has a dedicated portal for downloading and connecting through SSL Network Extender (SNX). If the portal is configured for username/password authentication, it is vulnerable to a brute-force attack on usernames and passwords.
Improper Restriction of Excessive Authentication Attempts
SSL Network Extender Client for Linux before build 800008302 reveals part of the contents of the configuration file supplied, which
CVE-2021-30357
5.3 - Medium
- June 08, 2021
SSL Network Extender Client for Linux before build 800008302 reveals part of the contents of the configuration file supplied, which allows partially disclosing files to which the user did not have access.
Generation of Error Message Containing Sensitive Information
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Check Point Software Ssl Network Extender or by Check Point Software? Click the Watch button to subscribe.