⚠ Actively exploited in ransomware campaigns
This vulnerability is on the CISA Known Exploited Vulnerabilities list and has been used in known ransomware attacks. CISA required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.. Due date: 2024-06-20.
CVE-2024-24919 — Check Point VPN: Sensitive Information Exposure in Checkpoint Cloudguard Network Security
Severity
8.6HIGHNVD
EPSS
94.3%
top 0.04%
CISA KEV
KEVRansomware
Added 2024-05-30
Due 2024-06-20
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedMay 28
KEV addedMay 30
KEV dueJun 20
Latest updateFeb 20
CISA Required Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Description
Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:NExploitability: 3.9 | Impact: 4.0
Affected Packages3 packages
Patches
🔴Vulnerability Details
2💥Exploits & PoCs
3🔍Detection Rules
1Suricata▶
ET WEB_SPECIFIC_APPS Checkpoint Quantum Security Gateway Arbitrary File Read Attempt (CVE-2024-24919)↗2024-05-30
📋Vendor Advisories
1🕵️Threat Intelligence
5Qualys
▶
Bleepingcomputer
▶