Attacks

Check Point VPN Vulnerability Advisory

Table of Contents

The latest announced VPN vulnerability is typical of the risks associated with VPNs. While VPNs are essential for secure remote access, they often harbor exploitable weaknesses that can undermine perimeter defenses. Such vulnerabilities allow attackers to infiltrate networks, access sensitive data, and compromise overall security. Organizations must remain vigilant, employing comprehensive security measures to detect and address threats affecting networks swiftly.

Vulnerability Background

On May 27th, Check Point Software Technologies (Check Point) published a blog post detailing security best practices in response to observed attempts to exploit vulnerabilities in VPN solutions from various vendors. Notably, they underscored that certain attempts focused on local accounts utilizing password-only authentication. On May 28th, Check Point updated its post, disclosing a new vulnerability (CVE-2024-24919) that affects Security Gateways with IPsec VPN in Remote Access VPN and stressing the critical importance of implementing mitigation measures promptly.

Initially, the vendor did not provide specifics regarding the CVE-2024-24919 vulnerability, and it was not assigned a risk score on CVE. However, researchers from Watchtowr, upon reviewing available information from the “hotfix” managed to discern the alterations and extract some conclusions. Their findings indicated that this vulnerability is critical, enabling relatively straightforward techniques such as path disclosure, and potentially allowing attackers to access sensitive files like the shadow file. Eventually, the vulnerability was assigned a CVSS risk score of 8.6, indicating a very serious vulnerability.

How the Vulnerability Is Exploited

Several PoC codes exploit this vulnerability with a simple POST request, allowing the attacker to gain access to the VPN system’s “passwd”, “shadow” and other important files using a Full Path Disclosure vulnerability, thereby creating persistence on the victim’s network.

According to Shodan, at least 20,000 indexed devices could be potentially vulnerable to this type of attack.

Immediate Action Items

  1. Install a mandatory Security Gateway Hotfix to prevent the exploitation of CVE-2024-24919 (https://support.checkpoint.com/results/sk/sk182336).
  2. Ensure all security solutions are fully deployed and up-to-date across your entire organization and your customers’ networks.
  3. Proactively hunt for indicators of compromise (IOCs) that attackers might have left behind during the vulnerability window.
  4. Continuously monitor your network for suspicious activity that might indicate an adversary’s presence within your network or your customers’ networks.
  5. Configure MFA as a regular policy for all VPN connections.
  6. As a precaution, change all credentials associated with users present on the device.

Vulnerability Check Tool

The Lumu Threat Intelligence team has developed a script that can detect vulnerable instances of Checkpoint VPNs. To request access to the tool, simply send a message to support@lumu.io.

Recent Posts

  • Attacks

Advisory Alert: Remcos RAT Real-Time Surveillance Platform

Reading Time: 7 minsHow does the 2026 Remcos RAT bypass your security to stream live…

2 days ago
  • Trends

RSAC 2026 Recap: The Dawn of the Agentic Era

Reading Time: 3 minsAs RSAC 2026 concludes, Ricardo Villadiego, CEO of Lumu Technologies, reflects on…

2 days ago
  • Trends

How to Turn MISP from a Compliance Burden into Active Defense

Reading Time: 4 minsManual MISP management creates a resource drain that risks business outages. It…

3 weeks ago
  • Trends

Why EDR Evasion is the New Threat Standard

Reading Time: 4 mins48% of ransomware attacks successfully evade EDR. Threat actors like Qilin are…

4 weeks ago
  • Attacks

Why AI Malware Demands Machine-Speed Defense

Reading Time: 6 minsAI-powered autonomous malware now generates unique threats at machine speed. This makes…

1 month ago
  • Trends

Automating Defense: The 2026 Battle Plan for Understaffed School IT

Reading Time: 4 minsThe Education sector is the number one global cyber target. It is…

2 months ago