{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-24915","assignerOrgId":"897c38be-0345-43cd-b6cf-fe179e0c4f45","state":"PUBLISHED","assignerShortName":"checkpoint","dateReserved":"2024-02-01T15:19:26.278Z","datePublished":"2025-06-29T12:02:41.126Z","dateUpdated":"2025-06-30T13:32:15.417Z"},"containers":{"cna":{"affected":[{"product":"Check Point SmartConsole","vendor":"checkpoint","versions":[{"status":"affected","version":"Check Point SmartConsole versions R81.10, R81.20, R82"}]}],"title":"SmartConsole Sensitive Credential Exposure via Memory Dump","descriptions":[{"lang":"en","value":"Credentials are not cleared from memory after being used. A user with Administrator permissions can execute memory dump for SmartConsole process and fetch them."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-316","description":"The product stores sensitive information in cleartext in memory.","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"897c38be-0345-43cd-b6cf-fe179e0c4f45","shortName":"checkpoint","dateUpdated":"2025-06-29T12:02:41.126Z"},"references":[{"url":"https://support.checkpoint.com/results/sk/sk183545"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":6.1,"baseSeverity":"MEDIUM"}}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-06-30T13:14:08.984786Z","id":"CVE-2024-24915","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-30T13:32:15.417Z"}}]}}