Active exploitation of Check Point security gateway devices
Summary
Active exploitation of Check Point security gateway devices
Affected platforms
The following platforms are known to be affected:
Check Point Quantum
Summary
Active exploitation of Check Point security gateway devices
Affected platforms
The following platforms are known to be affected:
Threat details
Introduction
Check Point has released security advisories relating to ongoing exploitation attempts against devices in the Quantum and CloudGuard family of products.
Quantum security gateways and firewalls perform advanced threat prevention, policy management, remote access VPN, IoT security, SD-WAN, and other services. CloudGuard is a SaaS platform that provides unified, cloud-native security across applications, workloads, and networks.
CVE-2024-24919 is an actively exploited zero-day vulnerability with a CVSSv3 score of 8.6 that can allow a remote, unauthenticated attacker to access arbitrary files on an affected device, leading to possible exfiltration of local user credentials resulting in persistent access and lateral movement into target networks.
This vulnerability affects any Check Point Security Gateway device that has either:
Threat updates
Remediation advice
Affected organisations must review the following advisories, apply the relevant hotfixes, and apply additional measures outlined by Check Point.
Definitive source of threat updates
CVE Vulnerabilities
Last edited: 4 June 2024 1:28 pm