Skip to main content

Hey folks,
I want to share this one cause there are already impacted organizations.
Cybersecurity experts have identified a critical zero-day vulnerability in Checkpoint’s security software that hackers are actively exploiting. The flaw assigned to the identifier CVE-2024-24919.

 

Summary: A high-severity vulnerability (CVSS: 8.6), identified by CVE-2024-24919, has been discovered in Check Point products. In its bulletin dated 28/05/204, Check Point reports that this vulnerability allows enumeration and extraction of all password hashes from connected users, which could be reused later.

Affected Versions:

  • For Check Point Quantum Gateway and CloudGuard Network products, the affected versions are: R81.20, R81.10, R81, and R80.40.
  • For Check Point Spark products, the affected versions are: R81.10 and R80.20.

Solution: To mitigate the risks associated with this vulnerability, Check Point has published documentation listing all necessary “hotfixes” to implement: Check Point Support.

The vendor strongly advises administrators of these products to follow all recommendations in this documentation and implement them as soon as possible.

https://advisories.checkpoint.com/defense/advisories/public/2024/cpai-2024-0353.html

 

thx for share @Stabz 


Thanks for sharing @Stabz 


Comment