Check Point Vulnerability: CVE-2024-24919
June 3, 2024
By Lauren Farrell
On May 28, 2024, Check Point released an advisory for CVE-2024-24919, a high priority bug which according to NIST NVD is categorized as “Exposure of Sensitive Information to an Unauthorized Actor”. The NVD has yet to assess a CVSS score for CVE-2024-24919 as of this writing. This vulnerability affects Check Point Security Gateway devices connected to the internet and configured with either IP-Sec VPN or Mobile Access software blades. When exploited, this vulnerability provides the attacker the ability to enumerate and extract password hashes for local accounts, including Active Directory service accounts, which can lead to lateral movement and complete compromise of targeted networks under the right conditions.
Check Point stated on May 31, 2024, that exploitation attempts have been ongoing since April 7, 2024. They have also observed attackers extracting the ntds.dit file from the Active Directory servers belonging to compromised organizations. The ntds.dit file is a database file that stores active directory data including users, groups, security descriptors and password hashes.
Vulnerable Systems and Circumstances:
According to the vendor advisory, the following products are vulnerable to CVE-2024-24919:
- CloudGuard Network
- Quantum Maestro
- Quantum Scalable Chassis
- Quantum Security Gateways
- Quantum Spark Appliances
- If the IPSec VPN blade has been enabled and the Security Gateway device is part of the Remote Access VPN community.
- If the Mobile Access blade has been enabled.
- Change the password of the LDAP Account Unit
- Reset password of local accounts connecting to Remote Access VPN with password-only authentication
- Prevent Local Accounts from connecting to VPN with Password-Only Authentication
- Renew the server certificates for the Inbound HTTPS Inspection on the Security Gateway
- Renew the certificate for the Outbound HTTPS Inspection on the Security Gateway
- Reset Gaia OS passwords for all local users
- Regenerate the SSH local user certificate on the Security Gateway in the following case:
- Renew the certificate for the SSH Inspection”
- https://nvd.nist.gov/vuln/detail/CVE-2024-24919
- https://medium.com/@verylazytech/cve-2024-24919-poc-bfd6508829bc
- https://www.rapid7.com/blog/post/2024/05/30/etr-cve-2024-24919-check-point-security-gateway-information-disclosure/
- https://labs.watchtowr.com/check-point-wrong-check-point-cve-2024-24919/#/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24919
- https://www.helpnetsecurity.com/2024/05/31/cve-2024-24919/
- https://censys.com/cve-2024-24919/
Know what’s coming. Stop what’s next.
Sign up for our free threat alert bulletin service here.
The Cybercrime Barrier Your Organization Deserves
Sign up for a custom demonstration from our security team of how we bring together the best minds and most complete collection of threat intelligence to provide you with a shocking level of relief.