Lucene search

K
vulnrichmentCheckpointVULNRICHMENT:CVE-2024-24919
HistoryMay 28, 2024 - 6:22 p.m.

CVE-2024-24919 Information disclosure

2024-05-2818:22:19
CWE-200
checkpoint
github.com
10
cve-2024-24919
information disclosure
remote access vpn
mobile access software blades
security fix

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

AI Score

8.4

Confidence

High

EPSS

0.945

Percentile

99.3%

SSVC

Exploitation

active

Automatable

yes

Technical Impact

partial

Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:o:checkpoint:quantum_security_gateway_firmware:r80.40:*:*:*:*:*:*:*"
    ],
    "vendor": "checkpoint",
    "product": "quantum_security_gateway_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "r80.40"
      },
      {
        "status": "affected",
        "version": "r81"
      },
      {
        "status": "affected",
        "version": "r81.10"
      },
      {
        "status": "affected",
        "version": "r81.20"
      }
    ],
    "defaultStatus": "affected"
  },
  {
    "cpes": [
      "cpe:2.3:a:checkpoint:cloudguard_network:r80.40:*:*:*:*:*:*:*"
    ],
    "vendor": "checkpoint",
    "product": "cloudguard_network",
    "versions": [
      {
        "status": "affected",
        "version": "r80.40"
      },
      {
        "status": "affected",
        "version": "r81"
      },
      {
        "status": "affected",
        "version": "r81.10"
      },
      {
        "status": "affected",
        "version": "r81.20"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:checkpoint:quantum_spark_appliances:r80.40:*:*:*:*:*:*:*"
    ],
    "vendor": "checkpoint",
    "product": "quantum_spark_appliances",
    "versions": [
      {
        "status": "affected",
        "version": "r80.40"
      },
      {
        "status": "affected",
        "version": "r81"
      },
      {
        "status": "affected",
        "version": "r81.10"
      },
      {
        "status": "affected",
        "version": "r81.20"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

AI Score

8.4

Confidence

High

EPSS

0.945

Percentile

99.3%

SSVC

Exploitation

active

Automatable

yes

Technical Impact

partial