Attacks

Check Point VPN Vulnerability Advisory

Table of Contents

The latest announced VPN vulnerability is typical of the risks associated with VPNs. While VPNs are essential for secure remote access, they often harbor exploitable weaknesses that can undermine perimeter defenses. Such vulnerabilities allow attackers to infiltrate networks, access sensitive data, and compromise overall security. Organizations must remain vigilant, employing comprehensive security measures to detect and address threats affecting networks swiftly.

Vulnerability Background

On May 27th, Check Point Software Technologies (Check Point) published a blog post detailing security best practices in response to observed attempts to exploit vulnerabilities in VPN solutions from various vendors. Notably, they underscored that certain attempts focused on local accounts utilizing password-only authentication. On May 28th, Check Point updated its post, disclosing a new vulnerability (CVE-2024-24919) that affects Security Gateways with IPsec VPN in Remote Access VPN and stressing the critical importance of implementing mitigation measures promptly.

Initially, the vendor did not provide specifics regarding the CVE-2024-24919 vulnerability, and it was not assigned a risk score on CVE. However, researchers from Watchtowr, upon reviewing available information from the “hotfix” managed to discern the alterations and extract some conclusions. Their findings indicated that this vulnerability is critical, enabling relatively straightforward techniques such as path disclosure, and potentially allowing attackers to access sensitive files like the shadow file. Eventually, the vulnerability was assigned a CVSS risk score of 8.6, indicating a very serious vulnerability.

How the Vulnerability Is Exploited

Several PoC codes exploit this vulnerability with a simple POST request, allowing the attacker to gain access to the VPN system’s “passwd”, “shadow” and other important files using a Full Path Disclosure vulnerability, thereby creating persistence on the victim’s network.

According to Shodan, at least 20,000 indexed devices could be potentially vulnerable to this type of attack.

Immediate Action Items

  1. Install a mandatory Security Gateway Hotfix to prevent the exploitation of CVE-2024-24919 (https://support.checkpoint.com/results/sk/sk182336).
  2. Ensure all security solutions are fully deployed and up-to-date across your entire organization and your customers’ networks.
  3. Proactively hunt for indicators of compromise (IOCs) that attackers might have left behind during the vulnerability window.
  4. Continuously monitor your network for suspicious activity that might indicate an adversary’s presence within your network or your customers’ networks.
  5. Configure MFA as a regular policy for all VPN connections.
  6. As a precaution, change all credentials associated with users present on the device.

Vulnerability Check Tool

The Lumu Threat Intelligence team has developed a script that can detect vulnerable instances of Checkpoint VPNs. To request access to the tool, simply send a message to support@lumu.io.

Recent Posts

  • Trends

Why EDR Evasion is the New Threat Standard

Reading Time: 4 mins48% of ransomware attacks successfully evade EDR. Threat actors like Qilin are…

6 days ago
  • Attacks

Why AI Malware Demands Machine-Speed Defense

Reading Time: 6 minsAI-powered autonomous malware now generates unique threats at machine speed. This makes…

2 weeks ago
  • Trends

Automating Defense: The 2026 Battle Plan for Understaffed School IT

Reading Time: 4 minsThe Education sector is the number one global cyber target. It is…

4 weeks ago
  • Trends

Redefining Proactive Security: Why Contact Is Not a Compromise

Reading Time: 5 minsContact is not compromise. True proactivity means prioritizing rapid response not blindly…

4 weeks ago
  • Attacks

Advisory Alert: AsyncRAT – Analysis, Evolution, and Defense Strategies

Reading Time: 6 minsAsyncRAT is an adaptable open-source Trojan that has evolved into a global…

1 month ago
  • Technical

Deconstructing a Multi-Stage Living-off-the-Land Attack

Reading Time: 10 minsThis technical deep-dive analyzes a sophisticated Amadey Stealer campaign leveraging Living-off-the-Land tactics…

2 months ago