Skip to main content

CVE-1999-0675: Check Point FireWall-1 can be subjected to a denial of service via UDP packets that are sent through

Medium
VulnerabilityCVE-1999-0675cve-1999-0675denial of service
Published: Mon Aug 09 1999 (08/09/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: checkpoint
Product: firewall-1

Description

Check Point FireWall-1 can be subjected to a denial of service via UDP packets that are sent through VPN-1 to port 0 of a host.

AI-Powered Analysis

AILast updated: 07/01/2025, 16:25:22 UTC

Technical Analysis

CVE-1999-0675 is a vulnerability affecting Check Point FireWall-1 versions 3.0 and 4.0, which are early releases of a widely used firewall product. The vulnerability allows an unauthenticated attacker to cause a denial of service (DoS) condition by sending specially crafted UDP packets through VPN-1 to port 0 of a host protected by the firewall. The attack exploits the way FireWall-1 processes UDP packets directed to port 0, which is an invalid port number and typically not used in legitimate network communications. When such packets are received, the firewall mishandles them, leading to resource exhaustion or a crash, thereby disrupting normal firewall operations and potentially blocking legitimate traffic. This vulnerability does not impact confidentiality or integrity but affects availability by causing service interruptions. The attack vector is network-based (AV:N), requires no authentication (Au:N), and has low attack complexity (AC:L). No patches are available for this vulnerability, and there are no known exploits in the wild, likely due to the age of the affected software versions and their limited current deployment. However, organizations still running these legacy versions remain at risk if exposed to untrusted networks. Given the firewall's critical role in network security, a DoS can have significant operational impacts, including loss of network perimeter defenses and exposure to further attacks.

Potential Impact

For European organizations, the impact of this vulnerability primarily concerns availability disruptions. Organizations relying on legacy Check Point FireWall-1 versions 3.0 or 4.0 could experience network outages or degraded firewall performance if targeted by this UDP-based DoS attack. This could lead to temporary loss of access to critical services, interruption of business operations, and increased risk exposure due to firewall downtime. Although the vulnerability does not compromise data confidentiality or integrity, the loss of firewall functionality can indirectly facilitate other attacks by removing a key security barrier. European entities in sectors with high network security requirements, such as finance, government, and critical infrastructure, could face operational and reputational damage. The absence of patches means mitigation relies on network-level controls and firewall upgrades. Given the age of the affected versions, the practical impact today is limited to organizations still using outdated firewall software, which is uncommon but possible in legacy or isolated environments.

Mitigation Recommendations

Since no patches are available for CVE-1999-0675, European organizations should prioritize upgrading from Check Point FireWall-1 versions 3.0 and 4.0 to supported, patched versions of the firewall software. If immediate upgrade is not feasible, organizations should implement network-level mitigations such as filtering or blocking UDP packets directed to port 0 at perimeter routers or upstream firewalls to prevent malicious traffic from reaching the vulnerable firewall. Monitoring network traffic for unusual UDP packets targeting port 0 can help detect attempted exploitation. Additionally, segmenting legacy firewall systems from untrusted networks and limiting exposure to the internet can reduce attack surface. Regular network security assessments should include checks for legacy firewall deployments and their configurations. Finally, organizations should consider deploying intrusion detection/prevention systems (IDS/IPS) capable of detecting anomalous UDP traffic patterns consistent with this attack vector.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df15b

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 4:25:22 PM

Last updated: 8/12/2025, 10:26:50 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats