Increase in Cyberattacks Targeting Check Point’s Latest VPN Vulnerability

Published:

spot_img

Rising Exploit Activity Targeting Check Point’s VPN Flaw: Urgent Action Required

Exploit activity targeting a recent information disclosure flaw in Check Point’s VPN technology has surged, prompting urgent action from organizations to address the vulnerability promptly. The vulnerability, labeled as CVE-2024-24919, impacts various versions of Check Point’s security gateways with IPsec VPN functionality, including CloudGuard Network, Quantum Maestro, Quantum Scalable Chassis, Quantum Security Gateways, and Quantum Spark appliances.

Check Point has cautioned that this flaw could allow attackers to access sensitive information within security gateways, potentially enabling lateral movement within compromised networks and obtaining domain admin privileges. Despite Check Point releasing a hotfix for the vulnerability on May 28, active exploitation attempts have been reported since early April, nearly two months prior to disclosure.

Internet traffic scanning firm Greynoise has identified a significant uptick in exploitation attempts targeting CVE-2024-24919 since May 31, coinciding with the release of a public proof-of-concept for the flaw. By June 5, Greynoise detected 782 IPs worldwide attempting to exploit the vulnerability. Furthermore, a Censys scan revealed 13,754 internet-exposed systems running the affected software, with a large concentration in Japan.

Experts have categorized the Check Point flaw as easy to find and exploit, with a severity rating of 8.6 out of 10 on the CVSS scale. The US Cybersecurity and Information Security Agency (CISA) has included CVE-2024-24919 in its list of known exploited vulnerabilities, mandating federal agencies to apply mitigations by June 20. Check Point has advised affected organizations to deploy its latest Jumbo Hotfix Accumulators or the security hotfix specifically for the vulnerability. Failure to address this critical flaw could result in severe consequences for organizations utilizing Check Point’s affected products.

spot_img

Related articles

Recent articles

GCCA Celebrates Supreme Council’s Decision to Create GCC Civil Aviation Authority

GCC Civil Aviation Authority: A New Era for Gulf Air Travel A Significant Development for the Gulf Region The General Civil Aviation Authority (GCAA) of the...

Researchers Find Over 30 Vulnerabilities in AI Coding Tools That Risk Data Theft and RCE Attacks

Unveiling the IDEsaster: Security Flaws in AI-Powered Coding Environments Overview of Recent Vulnerabilities A recent investigation has uncovered over 30 security vulnerabilities lurking within popular AI-powered...

XIXILI Transforms Plus-Size Lingerie in Malaysia

## A New Era for Plus Size Lingerie: Introducing XIXILI’s Collection ### Redefining Lingerie Shopping KUALA LUMPUR, MALAYSIA - In a bold move that reshapes the...

LockBit Ransomware Strikes Again: New Data Leak Site and 7 Victims Targeted

The Resurgence of LockBit Ransomware Group: New Developments and Victims The LockBit ransomware group, once a dominant player in the cybercrime arena, is beginning to...