cve/2024/CVE-2024-24919.md
2024-06-10 07:22:43 +00:00

72 lines
3.6 KiB
Markdown

### [CVE-2024-24919](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24919)
![](https://img.shields.io/static/v1?label=Product&message=Check%20Point%20Quantum%20Gateway%2C%20Spark%20Gateway%20and%20CloudGuard%20Network&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20Check%20Point%20Quantum%20Gateway%20and%20CloudGuard%20Network%20versions%20R81.20%2C%20R81.10%2C%20R81%2C%20R80.40%20and%20Check%20Point%20Spark%20versions%20R81.10%2C%20R80.20.%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen)
### Description
Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/0nin0hanz0/CVE-2024-24919-PoC
- https://github.com/0x3f3c/CVE-2024-24919
- https://github.com/0xans/CVE-2024-24919
- https://github.com/3UR/CVE-2024-24919
- https://github.com/B1naryo/CVE-2024-24919-POC
- https://github.com/Bytenull00/CVE-2024-24919
- https://github.com/Cappricio-Securities/CVE-2024-24919
- https://github.com/Expl0itD0g/CVE-2024-24919---Poc
- https://github.com/GlobalsecureAcademy/CVE-2024-24919
- https://github.com/GoatSecurity/CVE-2024-24919
- https://github.com/GuayoyoCyber/CVE-2024-24919
- https://github.com/J4F9S5D2Q7/CVE-2024-24919
- https://github.com/LucasKatashi/CVE-2024-24919
- https://github.com/MohamedWagdy7/CVE-2024-24919
- https://github.com/Ostorlab/KEV
- https://github.com/Praison001/CVE-2024-24919-Check-Point-Remote-Access-VPN
- https://github.com/RevoltSecurities/CVE-2024-24919
- https://github.com/Rug4lo/CVE-2024-24919-Exploit
- https://github.com/Tim-Hoekstra/CVE-2024-24919
- https://github.com/Vulnpire/CVE-2024-24919
- https://github.com/YN1337/CVE-2024-24919
- https://github.com/am-eid/CVE-2024-24919
- https://github.com/bigb0x/CVE-2024-24919-Sniper
- https://github.com/birdlex/cve-2024-24919-checker
- https://github.com/c3rrberu5/CVE-2024-24919
- https://github.com/emanueldosreis/CVE-2024-24919
- https://github.com/eoslvs/CVE-2024-24919
- https://github.com/fernandobortotti/CVE-2024-24919
- https://github.com/gurudattch/CVE-2024-24919
- https://github.com/hendprw/CVE-2024-24919
- https://github.com/ifconfig-me/CVE-2024-24919-Bulk-Scanner
- https://github.com/lirantal/cve-cvss-calculator
- https://github.com/mr-kasim-mehar/CVE-2024-24919-Exploit
- https://github.com/netlas-io/netlas-dorks
- https://github.com/nexblade12/CVE-2024-24919
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/nullcult/CVE-2024-24919-Exploit
- https://github.com/numencyber/Vulnerability_PoC
- https://github.com/pewc0/CVE-2024-24919
- https://github.com/r4p3c4/CVE-2024-24919-Checkpoint-Firewall-VPN-Check
- https://github.com/r4p3c4/CVE-2024-24919-Exploit-PoC-Checkpoint-Firewall-VPN
- https://github.com/satchhacker/cve-2024-24919
- https://github.com/satriarizka/CVE-2024-24919
- https://github.com/seed1337/CVE-2024-24919-POC
- https://github.com/sep2limited/CheckPoint_Query_Py
- https://github.com/shilpaverma2/NEW-CHECKPOINT-CVE
- https://github.com/smackerdodi/CVE-2024-24919-nuclei-templater
- https://github.com/starlox0/CVE-2024-24919-POC
- https://github.com/tanjiti/sec_profile
- https://github.com/un9nplayer/CVE-2024-24919
- https://github.com/verylazytech/CVE-2024-24919
- https://github.com/wjlin0/poc-doc
- https://github.com/wy876/POC
- https://github.com/wy876/wiki
- https://github.com/zam89/CVE-2024-24919