Check Point Vulnerability Report: CVE-2024-24919
Date: May 29, 2024
CVE: CVE-2024-24919
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
CWE: [[CWE-22]], [[CWE-425]]
Sources: Check Point, [Tenable](CVE-2024-24919 | Tenable®) Tenable Blog
Synopsis
A critical vulnerability (CVE-2024-24919) has been identified in Check Point's CloudGuard Network Security appliance, allowing unauthorized actors to access sensitive information.
Issue Summary
The vulnerability, categorized as an 'Exposure of Sensitive Information to an Unauthorized Actor,' affects Check Point's CloudGuard Network Security appliances. Attackers can exploit this vulnerability to read sensitive information from gateways connected to the Internet and enabled with Remote Access VPN or Mobile Access. The flaw is actively exploited in the wild, making it a high-priority issue for administrators.
Technical Key Findings
The vulnerability arises from a path traversal issue in the appliance's handling of certain HTTP requests. Attackers can manipulate the request paths to access files on the device, bypassing standard access controls. The exploit involves sending crafted HTTP requests to the vulnerable endpoint, allowing unauthorized file reads.
Vulnerable Products
- Check Point CloudGuard Network Security appliances with Remote Access VPN or Mobile Access enabled.
Impact Assessment
Exploiting this vulnerability can lead to unauthorized access to sensitive information, such as configuration files and password hashes. This could potentially escalate to full system compromise if critical files are accessed and misused.
Patches or Workaround
Check Point has released a hotfix to address this vulnerability. Administrators are urged to apply the patch immediately. The company also recommends placing the vulnerable gateway behind another security gateway with IPS and SSL inspection enabled as a temporary mitigation.
Tags
#CheckPoint #CVE-2024-24919 #InformationDisclosure #PathTraversal #NetworkSecurity #CloudGuard #SecurityPatch #VulnerabilityManagement #threatintelligence