Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

checkpoint

About This Vendor

checkpoint is a technology vendor producing software and infrastructure products. As a software provider, checkpoint's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of checkpoint's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 131 known vulnerabilities from checkpoint. This includes 3 critical-severity issues and 69 high-severity issues that represent significant risk. These vulnerabilities affect 383 distinct products across checkpoint's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 1998 through 2025, indicating decades of continuous security attention and research. Organizations deploying checkpoint products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-1999-1204 1998-05-11 2025-04-03 - 7.5 Likely
CVE-1999-0770 1999-07-29 2025-04-03 - 2.1 Unknown
CVE-1999-0675 1999-08-09 2025-04-03 - 5.0 Likely
CVE-1999-0895 1999-10-20 2025-04-03 - 7.5 Likely
CVE-2000-0116 2000-01-29 2025-04-03 - 7.5 Likely
CVE-2000-0150 2000-02-12 2025-04-03 - 7.5 Likely
CVE-2000-0181 2000-03-11 2025-04-03 - 5.0 Likely
CVE-2000-0482 2000-06-06 2025-04-03 - 5.0 Likely
CVE-2000-0582 2000-06-30 2025-04-03 - 5.0 Likely
CVE-2000-0779 2000-10-20 2025-04-03 - 7.5 Likely
CVE-2000-0804 2000-11-14 2025-04-03 - 7.5 Likely
CVE-2000-0805 2000-11-14 2025-04-03 - 7.5 Likely
CVE-2000-0806 2000-11-14 2025-04-03 - 5.0 Likely
CVE-2000-0807 2000-11-14 2025-04-03 - 7.5 Likely
CVE-2000-0808 2000-11-14 2025-04-03 - 7.5 Likely
CVE-2000-0809 2000-11-14 2025-04-03 - 5.0 Likely
CVE-2000-0813 2000-11-14 2025-04-03 - 5.0 Likely
CVE-2000-1032 2000-12-11 2025-04-03 - 5.0 Likely
CVE-2000-1037 2000-12-11 2025-04-03 - 7.5 Likely
CVE-2001-0082 2001-02-12 2025-04-03 - 7.5 Likely
CVE-2001-0182 2001-03-26 2025-04-03 - 5.0 Likely
CVE-2001-1158 2001-07-09 2025-04-03 - 7.5 Likely
CVE-2001-1176 2001-07-12 2025-04-03 - 7.5 Likely
CVE-2001-1303 2001-07-18 2025-04-03 - 5.0 Likely
CVE-2001-0682 2001-08-29 2025-04-03 5.5 2.1 Unknown
CVE-2000-1201 2001-08-31 2025-04-03 - 5.0 Likely
CVE-2001-1101 2001-09-08 2025-04-03 - 6.4 Likely
CVE-2001-1102 2001-09-08 2025-04-03 - 6.2 Unknown
CVE-2001-0940 2001-09-21 2025-04-03 - 7.5 Likely
CVE-2001-1431 2001-10-08 2025-04-03 - 5.0 Likely
CVE-2001-1499 2001-12-31 2025-04-03 - 5.0 Likely
CVE-2001-1171 2002-04-01 2025-04-03 - 7.2 Unknown
CVE-2002-0428 2002-08-12 2025-04-03 - 7.5 Likely
CVE-2002-1623 2002-12-31 2025-04-03 - 5.0 Likely
CVE-2002-2405 2002-12-31 2025-04-03 - 4.9 Unknown
CVE-2003-0757 2003-10-20 2025-04-03 - 5.0 Likely
CVE-2004-0039 2004-03-03 2025-04-03 - 10.0 Likely
CVE-2004-0040 2004-03-03 2025-04-03 - 10.0 Likely
CVE-2004-0469 2004-07-07 2025-04-03 - 10.0 Likely
CVE-2004-0699 2004-09-28 2025-04-03 - 7.5 Likely
CVE-2004-0079 2004-11-23 2025-04-03 7.5 5.0 Likely
CVE-2004-0081 2004-11-23 2025-04-03 - 5.0 Likely
CVE-2004-0112 2004-11-23 2025-04-03 - 5.0 Likely
CVE-2004-2679 2004-12-31 2025-04-03 - 7.8 Likely
CVE-2005-0114 2005-02-11 2025-04-03 - 2.1 Unknown
CVE-2005-2313 2005-07-19 2025-04-03 - 7.2 Unknown
CVE-2005-2889 2005-09-14 2025-04-03 - 7.5 Likely
CVE-2005-3673 2005-11-18 2025-04-03 - 7.8 Likely
CVE-2005-4093 2005-12-08 2025-04-03 - 6.5 Likely
CVE-2005-2932 2005-12-31 2025-04-03 - 7.2 Unknown
CVE-2006-0255 2006-01-18 2025-04-03 - 7.2 Unknown
CVE-2006-3885 2006-07-27 2025-04-03 - 5.0 Likely
CVE-2007-0471 2007-01-24 2025-04-09 - 7.5 Likely
CVE-2007-2174 2007-04-24 2025-04-09 - 7.2 Unknown
CVE-2007-2689 2007-05-16 2025-04-09 - 7.8 Likely
CVE-2007-2730 2007-05-16 2025-04-09 - 7.2 Unknown
CVE-2007-3489 2007-06-29 2025-04-09 - 9.3 Likely
CVE-2007-4216 2007-08-21 2025-04-09 - 7.2 Unknown
CVE-2008-0662 2008-02-08 2025-04-09 7.8 7.2 Unknown
CVE-2008-1208 2008-03-08 2025-04-09 - 4.3 Likely
CVE-2008-1397 2008-03-20 2025-04-09 - 6.5 Likely
CVE-2008-5849 2009-01-06 2025-04-09 - 5.0 Likely
CVE-2008-5994 2009-01-28 2025-04-09 - 4.3 Likely
CVE-2009-1227 2009-04-02 2025-04-09 - 10.0 Likely
CVE-2008-7009 2009-08-19 2025-04-09 - 6.9 Unknown
CVE-2008-7025 2009-08-21 2025-04-09 - 4.3 Likely
CVE-2011-2664 2011-07-08 2025-04-11 - 3.6 Unknown
CVE-2011-1827 2011-10-05 2025-04-11 - 9.3 Likely
CVE-2012-2753 2012-06-19 2025-04-11 - 6.9 Unknown
CVE-2010-5184 2012-08-25 2025-04-11 - 6.2 Unknown
CVE-2013-5635 2013-11-30 2025-04-11 - 3.3 Unknown
CVE-2013-5636 2013-11-30 2025-04-11 - 3.3 Unknown
CVE-2013-7304 2014-01-22 2025-04-11 - 4.3 Likely
CVE-2013-7311 2014-01-23 2025-04-11 - 5.4 Unknown
CVE-2014-1672 2014-01-26 2025-04-11 - 4.0 Unknown
CVE-2014-1673 2014-01-26 2025-04-11 - 5.0 Likely
CVE-2013-7350 2014-04-01 2025-04-12 - 10.0 Likely
CVE-2014-6271 2014-09-24 2025-10-22 9.8 10.0 Likely
CVE-2014-7169 2014-09-25 2025-10-22 9.8 10.0 Likely
CVE-2014-8950 2014-11-16 2025-04-12 - 7.1 Likely
CVE-2014-8951 2014-11-16 2025-04-12 - 7.1 Likely
CVE-2014-8952 2014-11-16 2025-04-12 - 7.1 Likely
CVE-2018-8790 2019-03-01 2024-11-21 7.8 7.2 Unknown
CVE-2019-8456 2019-04-09 2024-11-21 5.9 4.3 Likely
CVE-2019-8453 2019-04-17 2024-11-21 5.5 2.1 Unknown
CVE-2019-8455 2019-04-17 2024-11-21 7.1 3.6 Unknown
CVE-2019-8452 2019-04-22 2024-11-21 7.8 4.6 Unknown
CVE-2019-8454 2019-04-29 2024-11-21 7.0 6.9 Unknown
CVE-2019-8458 2019-06-20 2024-11-21 4.4 3.5 Unknown
CVE-2019-8459 2019-06-20 2024-11-21 9.8 7.5 Likely
CVE-2019-8461 2019-08-29 2024-11-21 7.8 6.8 Likely
CVE-2019-8462 2019-10-02 2024-11-21 7.5 5.0 Likely
CVE-2019-8463 2019-12-23 2024-11-21 7.5 5.0 Likely
CVE-2020-6013 2020-07-06 2024-11-21 8.8 6.5 Likely
CVE-2020-6012 2020-08-04 2024-11-21 7.4 4.4 Unknown
CVE-2020-6020 2020-09-24 2024-11-21 6.4 7.4 Unknown
CVE-2020-6022 2020-10-27 2024-11-21 5.5 3.6 Unknown
CVE-2020-6023 2020-10-27 2024-11-21 7.8 4.6 Unknown
CVE-2020-6014 2020-11-02 2024-11-21 6.5 4.4 Unknown
CVE-2020-6015 2020-11-05 2024-11-21 5.5 2.1 Unknown
CVE-2020-6021 2020-12-03 2024-11-21 7.8 4.4 Unknown
CVE-2020-6024 2021-01-20 2024-11-21 7.8 4.6 Unknown
CVE-2021-3449 2021-03-25 2024-11-21 5.9 4.3 Likely
CVE-2021-30356 2021-04-22 2024-11-21 8.1 5.5 Likely
CVE-2021-30357 2021-06-08 2024-11-21 5.3 5.0 Likely
CVE-2021-30358 2021-10-19 2024-11-21 7.2 6.0 Unknown
CVE-2021-30359 2021-10-22 2024-11-21 7.8 7.2 Unknown
CVE-2021-30360 2022-01-10 2024-11-21 7.8 7.2 Unknown
CVE-2022-23743 2022-05-11 2024-11-21 7.8 7.2 Unknown
CVE-2021-30361 2022-05-11 2024-11-21 6.7 6.9 Unknown
CVE-2022-23742 2022-05-12 2024-11-21 7.8 4.6 Unknown
CVE-2022-23744 2022-07-07 2024-11-21 2.3 2.1 Unknown
CVE-2022-23745 2022-07-18 2024-11-21 7.5 - -
CVE-2022-41604 2022-09-27 2025-05-22 8.8 - -
CVE-2022-23746 2022-11-30 2025-04-25 7.5 - -
CVE-2023-28133 2023-07-23 2024-11-21 7.8 - -
CVE-2023-28130 2023-07-26 2024-11-21 7.2 - -
CVE-2023-28134 2023-11-12 2024-11-21 7.8 - -
CVE-2024-24910 2024-04-18 2026-01-15 7.3 - -
CVE-2024-24912 2024-05-01 2025-08-26 6.7 - -
CVE-2024-24919 2024-05-28 2025-10-24 8.6 - -
CVE-2024-24914 2024-11-07 2025-08-26 8.0 - -
CVE-2024-6233 2024-11-22 2026-01-15 7.8 - -
CVE-2024-24911 2025-02-06 2025-10-15 5.3 - -
CVE-2024-52887 2025-04-27 2025-09-02 3.5 - -
CVE-2024-52888 2025-04-27 2025-09-02 5.4 - -
CVE-2024-24916 2025-06-19 2025-09-04 6.5 - -
CVE-2024-24915 2025-06-29 2025-09-03 6.1 - -
CVE-2024-52885 2025-08-06 2025-08-27 5.0 - -
CVE-2025-2028 2025-08-06 2025-08-27 6.5 - -
CVE-2025-3831 2025-08-12 2025-09-03 8.1 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for checkpoint by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with checkpoint's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.