Lucene search

K
githubexploitFF6C0584-ACA7-5E63-92B0-C40415A20FD6
HistoryMay 31, 2024 - 10:07 p.m.

Exploit for Exposure of Sensitive Information to an Unauthorized Actor in Checkpoint Quantum Security Gateway Firmware

2024-05-3122:07:21
131
cve-2024-24919
check point products
quantum maestro
quantum scalable chassis
quantum security gateways
cloudguard network
quantum spark appliances
r77.20 (eol)
r77.30 (eol)
r80.10 (eol)
r80.20 (eol)
r80.20.x
r80.20sp (eol)
r80.30 (eol)
r80.30sp (eol)
r80.40 (eol)
r81
r81.10
r81.10.x
r81.20
sensitive files
mycrl endpoint
installation
target.txt
usage
arguments
watchtowr labs
check point support
nvd

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

6.1 Medium

AI Score

Confidence

Low

0.945 High

EPSS

Percentile

99.2%

Exploit for CVE-2024-24919

Description

This Python script…

This is an article that belongs to githubexploit private collection.
Please sign in to get more Information.

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

6.1 Medium

AI Score

Confidence

Low

0.945 High

EPSS

Percentile

99.2%