### [CVE-2024-24919](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24919) ![](https://img.shields.io/static/v1?label=Product&message=Check%20Point%20Quantum%20Gateway%2C%20Spark%20Gateway%20and%20CloudGuard%20Network&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20Check%20Point%20Quantum%20Gateway%20and%20CloudGuard%20Network%20versions%20R81.20%2C%20R81.10%2C%20R81%2C%20R80.40%20and%20Check%20Point%20Spark%20versions%20R81.10%2C%20R80.20.%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen) ### Description Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available. ### POC #### Reference No PoCs from references. #### Github - https://github.com/0nin0hanz0/CVE-2024-24919-PoC - https://github.com/0x3f3c/CVE-2024-24919 - https://github.com/0xans/CVE-2024-24919 - https://github.com/3UR/CVE-2024-24919 - https://github.com/B1naryo/CVE-2024-24919-POC - https://github.com/Bytenull00/CVE-2024-24919 - https://github.com/Cappricio-Securities/CVE-2024-24919 - https://github.com/Expl0itD0g/CVE-2024-24919---Poc - https://github.com/GlobalsecureAcademy/CVE-2024-24919 - https://github.com/GoatSecurity/CVE-2024-24919 - https://github.com/GuayoyoCyber/CVE-2024-24919 - https://github.com/J4F9S5D2Q7/CVE-2024-24919 - https://github.com/LucasKatashi/CVE-2024-24919 - https://github.com/MohamedWagdy7/CVE-2024-24919 - https://github.com/Ostorlab/KEV - https://github.com/Praison001/CVE-2024-24919-Check-Point-Remote-Access-VPN - https://github.com/RevoltSecurities/CVE-2024-24919 - https://github.com/Rug4lo/CVE-2024-24919-Exploit - https://github.com/Tim-Hoekstra/CVE-2024-24919 - https://github.com/Vulnpire/CVE-2024-24919 - https://github.com/YN1337/CVE-2024-24919 - https://github.com/am-eid/CVE-2024-24919 - https://github.com/bigb0x/CVE-2024-24919-Sniper - https://github.com/birdlex/cve-2024-24919-checker - https://github.com/c3rrberu5/CVE-2024-24919 - https://github.com/emanueldosreis/CVE-2024-24919 - https://github.com/eoslvs/CVE-2024-24919 - https://github.com/fernandobortotti/CVE-2024-24919 - https://github.com/gurudattch/CVE-2024-24919 - https://github.com/hendprw/CVE-2024-24919 - https://github.com/ifconfig-me/CVE-2024-24919-Bulk-Scanner - https://github.com/lirantal/cve-cvss-calculator - https://github.com/mr-kasim-mehar/CVE-2024-24919-Exploit - https://github.com/netlas-io/netlas-dorks - https://github.com/nexblade12/CVE-2024-24919 - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/nullcult/CVE-2024-24919-Exploit - https://github.com/numencyber/Vulnerability_PoC - https://github.com/pewc0/CVE-2024-24919 - https://github.com/r4p3c4/CVE-2024-24919-Checkpoint-Firewall-VPN-Check - https://github.com/r4p3c4/CVE-2024-24919-Exploit-PoC-Checkpoint-Firewall-VPN - https://github.com/satchhacker/cve-2024-24919 - https://github.com/satriarizka/CVE-2024-24919 - https://github.com/seed1337/CVE-2024-24919-POC - https://github.com/sep2limited/CheckPoint_Query_Py - https://github.com/shilpaverma2/NEW-CHECKPOINT-CVE - https://github.com/smackerdodi/CVE-2024-24919-nuclei-templater - https://github.com/starlox0/CVE-2024-24919-POC - https://github.com/tanjiti/sec_profile - https://github.com/un9nplayer/CVE-2024-24919 - https://github.com/verylazytech/CVE-2024-24919 - https://github.com/wjlin0/poc-doc - https://github.com/wy876/POC - https://github.com/wy876/wiki - https://github.com/zam89/CVE-2024-24919