← Back to CVEs
CVE-2024-24919
HIGHCISA KEV8.6
Description
Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available.
CVE Details
CVSS v3.1 Score8.6
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published5/28/2024
Last Modified10/24/2025
Sourcekev
Honeypot Sightings0
CISA KEV
VendorCheck Point
ProductQuantum Security Gateways
Vulnerability NameCheck Point Quantum Security Gateways Information Disclosure Vulnerability
KEV Date Added2024-05-30
Remediation Due Date2024-06-20
Ransomware UseKnown
Affected Products
checkpoint:cloudguard_network_securitycheckpoint:quantum_security_gatewaycheckpoint:quantum_security_gateway_firmwarecheckpoint:quantum_sparkcheckpoint:quantum_spark_firmware
Weaknesses (CWE)
CWE-200
References
https://support.checkpoint.com/results/sk/sk182336(cve@checkpoint.com)
https://support.checkpoint.com/results/sk/sk182336(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-24919(134c704f-9b21-4f2e-91b3-4a467353bcc0)
https://www.mnemonic.io/resources/blog/advisory-check-point-remote-access-vpn-vulnerability-cve-2024-24919/(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.