Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2024-24919
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Information disclosure
Source: NVD (National Vulnerability Database)
Vulnerability Description
Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
信息暴露
Source: NVD (National Vulnerability Database)
Vulnerability Title
Check Point Security Gateways 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Check Point Security Gateways是以色列Check Point公司的一个人工智能驱动的 NGFW 安全网关。 Check Point Security Gateways 存在安全漏洞。攻击者利用该漏洞可以获取敏感信息。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
checkpointCheck Point Quantum Gateway, Spark Gateway and CloudGuard Network Check Point Quantum Gateway and CloudGuard Network versions R81.20, R81.10, R81, R80.40 and Check Point Spark versions R81.10, R80.20. -
II. Public POCs for CVE-2024-24919
#POC DescriptionSource LinkShenlong Link
1Nuclei Template to discover CVE-2024-24919. A path traversal vulnerability in CheckPoint SSLVPN.https://github.com/c3rrberu5/CVE-2024-24919POC Details
2POC exploit for CVE-2024-24919 information leakage https://github.com/emanueldosreis/CVE-2024-24919POC Details
3Nonehttps://github.com/hendprw/CVE-2024-24919POC Details
4CVE-2024-24919 Exploit PoChttps://github.com/LucasKatashi/CVE-2024-24919POC Details
5Nonehttps://github.com/eoslvs/CVE-2024-24919POC Details
6Quick and simple script that takes as input a file with multiple URLs to check for the CVE-2024-24919 vulnerability in CHECKPOINThttps://github.com/Bytenull00/CVE-2024-24919POC Details
7Nonehttps://github.com/am-eid/CVE-2024-24919POC Details
8Nonehttps://github.com/pewc0/CVE-2024-24919POC Details
9Simple POC Python script that check & leverage Check Point CVE-2024-24919 vulnerability (Wrong Check Point)https://github.com/zam89/CVE-2024-24919POC Details
10A simple bash and python script to check for the vulnerability CVE-2024-24919https://github.com/satriarizka/CVE-2024-24919POC Details
11CLI based PoC for CVE-2024-24919https://github.com/3UR/CVE-2024-24919POC Details
12An Vulnerability detection and Exploitation tool for CVE-2024-24919https://github.com/RevoltSecurities/CVE-2024-24919POC Details
13Nonehttps://github.com/Vulnpire/CVE-2024-24919POC Details
14Nonehttps://github.com/seed1337/CVE-2024-24919-POCPOC Details
15Nonehttps://github.com/0x3f3c/CVE-2024-24919POC Details
16Nonehttps://github.com/Praison001/CVE-2024-24919-Check-Point-Remote-Access-VPNPOC Details
17Nuclei template for CVE-2024-24919 https://github.com/smackerdodi/CVE-2024-24919-nuclei-templaterPOC Details
18CVE-2024-24919 exploithttps://github.com/GoatSecurity/CVE-2024-24919POC Details
19Exploit tool to validate CVE-2024-24919 vulnerability on Checkpoint Firewall VPNshttps://github.com/GlobalsecureAcademy/CVE-2024-24919POC Details
20Nonehttps://github.com/nexblade12/CVE-2024-24919POC Details
21This repository contains a proof-of-concept (PoC) exploit for CVE-2024-24919, a critical vulnerability discovered in Check Point SVN. The vulnerability allows for reading system files. CVE ID: CVE-2024-24919https://github.com/un9nplayer/CVE-2024-24919POC Details
22Nonehttps://github.com/MohamedWagdy7/CVE-2024-24919POC Details
23Check Point Security Gateway (LFI)https://github.com/Cappricio-Securities/CVE-2024-24919POC Details
24Nonehttps://github.com/fernandobortotti/CVE-2024-24919POC Details
25Nonehttps://github.com/nicolvsrlr27/CVE-2024-24919POC Details
26Nonehttps://github.com/gurudattch/CVE-2024-24919POC Details
27Mass scanner for CVE-2024-24919https://github.com/YN1337/CVE-2024-24919POC Details
28CVE-2024-24919 [Check Point Security Gateway Information Disclosure]https://github.com/ifconfig-me/CVE-2024-24919-Bulk-ScannerPOC Details
29Esta herramienta se utiliza para validar la vulnerabilidad CVE-2024-24919 en las VPN de Checkpoint Firewallhttps://github.com/r4p3c4/CVE-2024-24919-Checkpoint-Firewall-VPN-CheckPOC Details
30Herramienta de explotación para explotar la vulnerabilidad CVE-2024-24919 en las VPN de Checkpoint Firewallhttps://github.com/r4p3c4/CVE-2024-24919-Exploit-PoC-Checkpoint-Firewall-VPNPOC Details
31Nonehttps://github.com/J4F9S5D2Q7/CVE-2024-24919POC Details
32Nonehttps://github.com/mr-kasim-mehar/CVE-2024-24919-ExploitPOC Details
33Nonehttps://github.com/B1naryo/CVE-2024-24919-POCPOC Details
34a Proof of Concept of CVE-2024-24919https://github.com/Expl0itD0g/CVE-2024-24919---PocPOC Details
35CVE-2024-24919 Sniper - A powerful tool for scanning Check Point Security Gateway CVE-2024-24919 vulnerability. Supports single & bulk scanning, multithreading, and generates detailed CSV reports. Ideal for penetration testers and security researchers.https://github.com/bigb0x/CVE-2024-24919-SniperPOC Details
36Nonehttps://github.com/birdlex/cve-2024-24919-checkerPOC Details
37 CVE-2024-24919 Exploit and PoC - Critical LFI for Remote Access VPN or Mobile Access.https://github.com/Rug4lo/CVE-2024-24919-ExploitPOC Details
38Nonehttps://github.com/0nin0hanz0/CVE-2024-24919-PoCPOC Details
39Nmap script to check vulnerability CVE-2024-24919https://github.com/GuayoyoCyber/CVE-2024-24919POC Details
40Nonehttps://github.com/0xans/CVE-2024-24919POC Details
41Nonehttps://github.com/Tim-Hoekstra/CVE-2024-24919POC Details
42A Simple Exploit Code(POC) to Automate CVE-2024–24919https://github.com/starlox0/CVE-2024-24919-POCPOC Details
43CVE-2024-24919 exploit that checks more files for better visibilityhttps://github.com/nullcult/CVE-2024-24919-ExploitPOC Details
44Nonehttps://github.com/satchhacker/cve-2024-24919POC Details
45Nonehttps://github.com/P3wc0/CVE-2024-24919POC Details
46Nonehttps://github.com/J4F9S5D2Q7/CVE-2024-24919-CHECKPOINTPOC Details
47POC - CVE-2024–24919 - Check Point Security Gatewayshttps://github.com/verylazytech/CVE-2024-24919POC Details
48Python script to automate the process of finding vulnerable sites for CVE-2024-24919.https://github.com/protonnegativo/CVE-2024-24919POC Details
49Nonehttps://github.com/SalehLardhi/CVE-2024-24919POC Details
50Nonehttps://github.com/ShadowByte1/CVE-2024-24919POC Details
51Hello everyone, I am sharing a modified script from CVE-2024-24919 which can extract paths categorized as critical.https://github.com/H3KEY/CVE-2024-24919POC Details
52Nonehttps://github.com/Jutrm/cve-2024-24919POC Details
53Nonehttps://github.com/smkxt1/CVE-2024-24919POC Details
54Nonehttps://github.com/yagyuufellinluvv/CVE-2024-24919POC Details
55Nonehttps://github.com/LuisMateo1/Arbitrary-File-Read-CVE-2024-24919POC Details
56🔍 Just wrapped up an incident report on a Phishing Alert (Event ID 257, SOC282). Enhancing my expertise in email threat detection and response! 🚨 #Cybersecurity #SOCAnalyst #LetsDefendhttps://github.com/AhmedMansour93/Event-ID-263-Rule-Name-SOC287---Arbitrary-File-Read-on-Checkpoint-Security-Gateway-CVE-2024-24919-POC Details
57Nonehttps://github.com/0xYumeko/CVE-2024-24919POC Details
58PoC script for CVE-2024-24919 vulnerability. It scans a list of target URLs to identify security issues by sending HTTP POST requests and analyzing server responseshttps://github.com/geniuszlyy/CVE-2024-24919POC Details
59Nonehttps://github.com/skyrowalker/CVE-2024-24919POC Details
60Nonehttps://github.com/0xkalawy/CVE-2024-24919POC Details
61It's Proof of Concept on CVE-2024-24919-POC , i made it after it's discoverd https://github.com/sar-3mar/CVE-2024-24919_POCPOC Details
62Check-Point安全网关任意文件读取漏洞(CVE-2024-24919)https://github.com/NingXin2002/Check-Point_pocPOC Details
63PoC script for CVE-2024-24919 vulnerability. It scans a list of target URLs to identify security issues by sending HTTP POST requests and analyzing server responseshttps://github.com/geniuszly/CVE-2024-24919POC Details
64CVE-2024-24919 exploit that checks more files for better visibilityhttps://github.com/ronniensale/CVE-2024-24919-ExploitPOC Details
65SOC287 - Arbitrary File Read on Checkpoint Security Gateway [CVE-2024-24919]https://github.com/drake044/SOC_287POC Details
66SOC287 - Arbitrary File Read on Checkpoint Security Gateway [CVE-2024-24919]https://github.com/hashdr1ft/SOC_287POC Details
67Nonehttps://github.com/funixone/CVE-2024-24919---Exploit-ScriptPOC Details
68Nonehttps://github.com/spider00009/CVE-2024-24919-POCPOC Details
69Nonehttps://github.com/0xlf/CVE-2024-24919POC Details
70Nonehttps://github.com/ejaboz/cve-2024-24919POC Details
71Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-24919.yamlPOC Details
72Nonehttps://github.com/zxcod3/CVE-2024-24919POC Details
73Nonehttps://github.com/CyprianAtsyor/CVE-2024-24919-Incident-Report.mdPOC Details
74Nonehttps://github.com/CyberBibs/Event-ID-263-Arbitrary-File-Read-on-Checkpoint-Security-Gateway-CVE-2024-24919-POC Details
75Nonehttps://github.com/MacUchegit/Detecting-and-Analyzing-CVE-2024-24919-ExploitationPOC Details
76Nonehttps://github.com/SpiX-7/CVE-2024-24919-POCPOC Details
77Nonehttps://github.com/0zerobyte/CVE-2024-24919POC Details
78Nonehttps://github.com/voidbroker/CVE-2024-24919POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2024-24919
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2024-24919

No comments yet


Leave a comment