{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-24919","assignerOrgId":"897c38be-0345-43cd-b6cf-fe179e0c4f45","state":"PUBLISHED","assignerShortName":"checkpoint","dateReserved":"2024-02-01T15:19:26.279Z","datePublished":"2024-05-28T18:22:19.401Z","dateUpdated":"2025-10-21T23:05:17.408Z"},"containers":{"cna":{"affected":[{"product":"Check Point Quantum Gateway, Spark Gateway and CloudGuard Network","vendor":"checkpoint","versions":[{"status":"affected","version":"Check Point Quantum Gateway and CloudGuard Network versions R81.20, R81.10, R81, R80.40 and Check Point Spark versions R81.10, R80.20."}]}],"title":"Information disclosure","descriptions":[{"lang":"en","value":"Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-200","description":"CWE-200: Exposure of Sensitive Information to an Unauthorized Actor","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"897c38be-0345-43cd-b6cf-fe179e0c4f45","shortName":"checkpoint","dateUpdated":"2024-05-30T12:40:21.757Z"},"references":[{"url":"https://support.checkpoint.com/results/sk/sk182336"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":8.6,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N"}}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-24919","role":"CISA Coordinator","options":[{"Exploitation":"active"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-05-31T04:00:11.841700Z"}}},{"other":{"type":"kev","content":{"dateAdded":"2024-05-30","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-24919"}}}],"affected":[{"cpes":["cpe:2.3:o:checkpoint:quantum_security_gateway_firmware:r80.40:*:*:*:*:*:*:*"],"vendor":"checkpoint","product":"quantum_security_gateway_firmware","versions":[{"status":"affected","version":"r80.40"},{"status":"affected","version":"r81"},{"status":"affected","version":"r81.10"},{"status":"affected","version":"r81.20"}],"defaultStatus":"affected"},{"cpes":["cpe:2.3:o:checkpoint:quantum_security_gateway_firmware:r80.40:*:*:*:*:*:*:*"],"vendor":"checkpoint","product":"quantum_security_gateway_firmware","versions":[{"status":"affected","version":"r80.40"},{"status":"affected","version":"r81"},{"status":"affected","version":"r81.10"},{"status":"affected","version":"r81.20"}],"defaultStatus":"affected"},{"cpes":["cpe:2.3:o:checkpoint:quantum_security_gateway_firmware:r80.40:*:*:*:*:*:*:*"],"vendor":"checkpoint","product":"quantum_security_gateway_firmware","versions":[{"status":"affected","version":"r80.40"},{"status":"affected","version":"r81"},{"status":"affected","version":"r81.10"},{"status":"affected","version":"r81.20"}],"defaultStatus":"affected"},{"cpes":["cpe:2.3:o:checkpoint:quantum_security_gateway_firmware:r80.40:*:*:*:*:*:*:*"],"vendor":"checkpoint","product":"quantum_security_gateway_firmware","versions":[{"status":"affected","version":"r80.40"},{"status":"affected","version":"r81"},{"status":"affected","version":"r81.10"},{"status":"affected","version":"r81.20"}],"defaultStatus":"affected"},{"cpes":["cpe:2.3:a:checkpoint:cloudguard_network:r80.40:*:*:*:*:*:*:*"],"vendor":"checkpoint","product":"cloudguard_network","versions":[{"status":"affected","version":"r80.40"},{"status":"affected","version":"r81"},{"status":"affected","version":"r81.10"},{"status":"affected","version":"r81.20"}],"defaultStatus":"unknown"},{"cpes":["cpe:2.3:a:checkpoint:cloudguard_network:r80.40:*:*:*:*:*:*:*"],"vendor":"checkpoint","product":"cloudguard_network","versions":[{"status":"affected","version":"r80.40"},{"status":"affected","version":"r81"},{"status":"affected","version":"r81.10"},{"status":"affected","version":"r81.20"}],"defaultStatus":"unknown"},{"cpes":["cpe:2.3:a:checkpoint:cloudguard_network:r80.40:*:*:*:*:*:*:*"],"vendor":"checkpoint","product":"cloudguard_network","versions":[{"status":"affected","version":"r80.40"},{"status":"affected","version":"r81"},{"status":"affected","version":"r81.10"},{"status":"affected","version":"r81.20"}],"defaultStatus":"unknown"},{"cpes":["cpe:2.3:a:checkpoint:cloudguard_network:r80.40:*:*:*:*:*:*:*"],"vendor":"checkpoint","product":"cloudguard_network","versions":[{"status":"affected","version":"r80.40"},{"status":"affected","version":"r81"},{"status":"affected","version":"r81.10"},{"status":"affected","version":"r81.20"}],"defaultStatus":"unknown"},{"cpes":["cpe:2.3:a:checkpoint:quantum_spark_appliances:r80.40:*:*:*:*:*:*:*"],"vendor":"checkpoint","product":"quantum_spark_appliances","versions":[{"status":"affected","version":"r80.40"},{"status":"affected","version":"r81"},{"status":"affected","version":"r81.10"},{"status":"affected","version":"r81.20"}],"defaultStatus":"unknown"},{"cpes":["cpe:2.3:a:checkpoint:quantum_spark_appliances:r80.40:*:*:*:*:*:*:*"],"vendor":"checkpoint","product":"quantum_spark_appliances","versions":[{"status":"affected","version":"r80.40"},{"status":"affected","version":"r81"},{"status":"affected","version":"r81.10"},{"status":"affected","version":"r81.20"}],"defaultStatus":"unknown"},{"cpes":["cpe:2.3:a:checkpoint:quantum_spark_appliances:r80.40:*:*:*:*:*:*:*"],"vendor":"checkpoint","product":"quantum_spark_appliances","versions":[{"status":"affected","version":"r80.40"},{"status":"affected","version":"r81"},{"status":"affected","version":"r81.10"},{"status":"affected","version":"r81.20"}],"defaultStatus":"unknown"},{"cpes":["cpe:2.3:a:checkpoint:quantum_spark_appliances:r80.40:*:*:*:*:*:*:*"],"vendor":"checkpoint","product":"quantum_spark_appliances","versions":[{"status":"affected","version":"r80.40"},{"status":"affected","version":"r81"},{"status":"affected","version":"r81.10"},{"status":"affected","version":"r81.20"}],"defaultStatus":"unknown"}],"references":[{"url":"https://www.mnemonic.io/resources/blog/advisory-check-point-remote-access-vpn-vulnerability-cve-2024-24919/","tags":["exploit"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-24919","tags":["government-resource"]}],"timeline":[{"lang":"en","time":"2024-05-30T00:00:00.000Z","value":"CVE-2024-24919 added to CISA KEV"}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-21T23:05:17.408Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T23:36:20.565Z"},"title":"CVE Program Container","references":[{"url":"https://support.checkpoint.com/results/sk/sk182336","tags":["x_transferred"]}]}]}}