Check Point Security Gateway Arbitrary File Read exploit - #CVE-2024-24919
A critical path traversal vulnerability, identified as CVE-2024-24919 with a CVSS score of 8.6, has been discovered in Check Point Security Gateways. This vulnerability allows attackers to read arbitrary files on affected systems through crafted requests, leading to potential exposure of sensitive data like password hashes. Exploitation attempts have surged, with significant activity from numerous IP addresses globally. Check Point has issued hotfixes for various impacted products, including CloudGuard Network, Quantum Maestro, and Quantum Spark appliances, urging users to apply updates immediately. Threat intelligence from sources like SonicWall and GreyNoise highlights the widespread and active exploitation of this flaw, emphasizing the need for timely patching and vigilant security practices. Additionally, tools like vulnerability scanners and Metasploit modules have been developed to detect and exploit this issue, underscoring its severity and the critical importance of mitigation measures.