The technical details and real-world exploitation of CVE-2024-24919 highlight the critical nature of this vulnerability and the importance of prompt remediation to protect against potential data breaches and network compromises. Vulnerability Description 📌CVE-2024-24919 is an information disclosure vulnerability that allows an unauthenticated remote attacker to read the contents of arbitrary files on the affected appliance. 📌It is categorized as an «Exposure of Sensitive Information to an Unauthorized Actor» vulnerability. 📌The vulnerability affects systems with the Remote Access VPN or Mobile Access software blades enabled. Affected Products 📌CloudGuard Network 📌Quantum Maestro 📌Quantum Scalable Chassis 📌Quantum Security Gateways 📌Quantum Spark Appliances Exploitation Details 📌The vulnerability can be exploited by sending a crafted request to the /clients/MyCRL endpoint, which is designed to serve static files from the filesystem. 📌By including path traversal sequences like
Check Point’s 'Best Security' Slogan Meets Reality: CVE-2024-24919
22 июля 202422 июл 2024
2 мин