Lucene search

K
cvelistCheckpointCVELIST:CVE-2024-24919
HistoryMay 28, 2024 - 6:22 p.m.

CVE-2024-24919 Information disclosure

2024-05-2818:22:19
CWE-200
checkpoint
www.cve.org
16
check point
security gateways
information disclosure
cve-2024-24919
vulnerability
security fix
remote access vpn
mobile access software blades

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

AI Score

8.3

Confidence

High

EPSS

0.945

Percentile

99.3%

Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available.

CNA Affected

[
  {
    "product": "Check Point Quantum Gateway, Spark Gateway and CloudGuard Network",
    "vendor": "checkpoint",
    "versions": [
      {
        "status": "affected",
        "version": "Check Point Quantum Gateway and CloudGuard Network versions R81.20, R81.10, R81, R80.40 and Check Point Spark versions R81.10, R80.20."
      }
    ]
  }
]

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

AI Score

8.3

Confidence

High

EPSS

0.945

Percentile

99.3%