Alert - Vulnerability impacting Check Point Network Security Gateways (CVE-2024-24919)

Number: AL24-007
Date: May 31, 2024

Audience

This Alert is intended for IT professionals and managers.

Purpose

An Alert is used to raise awareness of a recently identified cyber threat Cyber threatA threat actor, using the internet, who takes advantage of a known vulnerability in a product for the purposes of exploiting a network and the information the network carries. that may impact cyber information assets, and to provide additional detection DetectionThe monitoring and analyzing of system events in order to identify unauthorized attempts to access system resources. and mitigation advice to recipients. The Canadian Centre for Cyber Security Cyber securityThe protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information. More specifically, cyber security includes the body of technologies, processes, practices and response and mitigation measures designed to protect networks, computers, programs and data from attack, damage or unauthorized access so as to ensure confidentiality, integrity and availability. ("Cyber Centre") is also available to provide additional assistance regarding the content of this Alert to recipients as requested.

Details

The Cyber Centre is aware of a critical vulnerability VulnerabilityA flaw or weakness in the design or implementation of an information system or its environment that could be exploited to adversely affect an organization's assets or operations. (CVE-2024-24919) impacting Check Point Security Gateways with IPsec VPN VPNSee virtual private network. blade enabled and in the Remote Access VPN community or with Mobile Access blade enabledFootnote 1. An unauthenticated threat actor can exploit this vulnerability to access sensitive information as superuser on the deviceFootnote 2Footnote 3. On May 29, the Cyber Centre published AV24-305 to encourage readers to patch at their earliest opportunityFootnote 4.

The Cyber Centre has received reports that this vulnerability is being actively exploited.

The following Check Point products and versions are affected by this vulnerability:

  • Products:
    • CloudGuard Network
    • Quantum Maestro
    • Quantum Scalable Chassis
    • Quantum Security Gateways
    • Quantum Spark Appliances
  • Versions:
    • R77.20 (EOL)
    • R77.30 (EOL)
    • R80.10 (EOL)
    • R80.20 (EOL)
    • R80.20.x
    • R80.20SP (EOL)
    • R80.30 (EOL)
    • R80.30SP (EOL)
    • R80.40 (EOL)
    • R81
    • R81.10
    • R81.10.x
    • R81.20

Suggested actions

The Cyber Centre strongly recommends that:

  • Organizations using an affected device and version should ensure that the system is patched immediatelyFootnote 1.
  • All stored credentials and certificates present on the device should be reset or revoked both on the device and the enterprise environment.
  • Organizations disable unused, local VPN accounts.
  • Organizations should review connection logs to identify authorized connections from unknown sources.
  • Organizations should review and implement the Cyber Centre’s Top 10 IT Security ActionsFootnote 5 with an emphasis on the following topics:
    • Consolidating, monitoring, and defending Internet gateways.
    • Patching operating systems and applications.
    • Enforce the management of administrative privileges.
    • Segmenting and separating information.
    • Protecting information at the enterprise level.

If activity matching the content of this alert is discovered, recipients are encouraged to report via the My Cyber Portal, or email contact@cyber.gc.ca.

Date modified: