Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available.
https://www.rapid7.com/blog/post/2024/06/21/metasploit-weekly-wrap-up-06-21-2024/
https://www.greynoise.io/blog/whats-going-on-with-checkpoint-cve-2024-24919
https://www.theregister.com/2024/06/03/infosec_in_brief/
https://medium.com/@verylazytech/cve-2024-24919-poc-bfd6508829bc?source=rss------hacking-5
https://medium.com/@verylazytech/cve-2024-24919-poc-bfd6508829bc?source=rss------exploit-5
https://medium.com/@verylazytech/cve-2024-24919-poc-bfd6508829bc?source=rss------cybersecurity-5
https://medium.com/@jr.mayank1999/exploit-poc-of-cve-2024-24919-0077396a90bd?source=rss------cve-5
https://thecyberthrone.in/2024/05/31/cisa-kev-catalog-update-may-2024-part-iv/
https://thecyberthrone.in/2024/05/30/checkpoint-fixed-zeroday-flaw-cve-2024-24919/
https://thehackernews.com/2024/05/cisa-alerts-federal-agencies-to-patch.html
https://securityaffairs.com/163850/digital-id/check-point-vpn-zero-day-hotfix.html
https://blog.checkpoint.com/security/enhance-your-vpn-security-posture
https://support.checkpoint.com/results/sk/sk182336
https://support.checkpoint.com/results/sk/sk182336
https://blog.checkpoint.com/security/enhance-your-vpn-security-posture