← Volver a CVEs
CVE-2024-24919
HIGHCISA KEV8.6
Descripcion
Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available.
Detalles CVE
Puntuacion CVSS v3.18.6
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado5/28/2024
Ultima modificacion10/24/2025
Fuentekev
Avistamientos honeypot0
CISA KEV
VendedorCheck Point
ProductoQuantum Security Gateways
Nombre vulnerabilidadCheck Point Quantum Security Gateways Information Disclosure Vulnerability
Fecha inclusion KEV2024-05-30
Fecha limite remediacion2024-06-20
Uso en ransomwareKnown
Productos afectados
checkpoint:cloudguard_network_securitycheckpoint:quantum_security_gatewaycheckpoint:quantum_security_gateway_firmwarecheckpoint:quantum_sparkcheckpoint:quantum_spark_firmware
Debilidades (CWE)
CWE-200
Referencias
https://support.checkpoint.com/results/sk/sk182336(cve@checkpoint.com)
https://support.checkpoint.com/results/sk/sk182336(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-24919(134c704f-9b21-4f2e-91b3-4a467353bcc0)
https://www.mnemonic.io/resources/blog/advisory-check-point-remote-access-vpn-vulnerability-cve-2024-24919/(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.