Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2024-24919", "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "state": "PUBLISHED", "assignerShortName": "checkpoint", "dateReserved": "2024-02-01T15:19:26.279Z", "datePublished": "2024-05-28T18:22:19.401Z", "dateUpdated": "2025-10-21T23:05:17.408Z"}, "containers": {"cna": {"affected": [{"product": "Check Point Quantum Gateway, Spark Gateway and CloudGuard Network", "vendor": "checkpoint", "versions": [{"status": "affected", "version": "Check Point Quantum Gateway and CloudGuard Network versions R81.20, R81.10, R81, R80.40 and Check Point Spark versions R81.10, R80.20."}]}], "title": "Information disclosure", "descriptions": [{"lang": "en", "value": "Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available."}], "problemTypes": [{"descriptions": [{"cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "shortName": "checkpoint", "dateUpdated": "2024-05-30T12:40:21.757Z"}, "references": [{"url": "https://support.checkpoint.com/results/sk/sk182336"}], "metrics": [{"format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}], "cvssV3_1": {"version": "3.1", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N"}}]}, "adp": [{"metrics": [{"other": {"type": "ssvc", "content": {"id": "CVE-2024-24919", "role": "CISA Coordinator", "options": [{"Exploitation": "active"}, {"Automatable": "yes"}, {"Technical Impact": "partial"}], "version": "2.0.3", "timestamp": "2024-05-31T04:00:11.841700Z"}}}, {"other": {"type": "kev", "content": {"dateAdded": "2024-05-30", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-24919"}}}], "affected": [{"cpes": ["cpe:2.3:o:checkpoint:quantum_security_gateway_firmware:r80.40:*:*:*:*:*:*:*"], "vendor": "checkpoint", "product": "quantum_security_gateway_firmware", "versions": [{"status": "affected", "version": "r80.40"}, {"status": "affected", "version": "r81"}, {"status": "affected", "version": "r81.10"}, {"status": "affected", "version": "r81.20"}], "defaultStatus": "affected"}, {"cpes": ["cpe:2.3:o:checkpoint:quantum_security_gateway_firmware:r80.40:*:*:*:*:*:*:*"], "vendor": "checkpoint", "product": "quantum_security_gateway_firmware", "versions": [{"status": "affected", "version": "r80.40"}, {"status": "affected", "version": "r81"}, {"status": "affected", "version": "r81.10"}, {"status": "affected", "version": "r81.20"}], "defaultStatus": "affected"}, {"cpes": ["cpe:2.3:o:checkpoint:quantum_security_gateway_firmware:r80.40:*:*:*:*:*:*:*"], "vendor": "checkpoint", "product": "quantum_security_gateway_firmware", "versions": [{"status": "affected", "version": "r80.40"}, {"status": "affected", "version": "r81"}, {"status": "affected", "version": "r81.10"}, {"status": "affected", "version": "r81.20"}], "defaultStatus": "affected"}, {"cpes": ["cpe:2.3:o:checkpoint:quantum_security_gateway_firmware:r80.40:*:*:*:*:*:*:*"], "vendor": "checkpoint", "product": "quantum_security_gateway_firmware", "versions": [{"status": "affected", "version": "r80.40"}, {"status": "affected", "version": "r81"}, {"status": "affected", "version": "r81.10"}, {"status": "affected", "version": "r81.20"}], "defaultStatus": "affected"}, {"cpes": ["cpe:2.3:a:checkpoint:cloudguard_network:r80.40:*:*:*:*:*:*:*"], "vendor": "checkpoint", "product": "cloudguard_network", "versions": [{"status": "affected", "version": "r80.40"}, {"status": "affected", "version": "r81"}, {"status": "affected", "version": "r81.10"}, {"status": "affected", "version": "r81.20"}], "defaultStatus": "unknown"}, {"cpes": ["cpe:2.3:a:checkpoint:cloudguard_network:r80.40:*:*:*:*:*:*:*"], "vendor": "checkpoint", "product": "cloudguard_network", "versions": [{"status": "affected", "version": "r80.40"}, {"status": "affected", "version": "r81"}, {"status": "affected", "version": "r81.10"}, {"status": "affected", "version": "r81.20"}], "defaultStatus": "unknown"}, {"cpes": ["cpe:2.3:a:checkpoint:cloudguard_network:r80.40:*:*:*:*:*:*:*"], "vendor": "checkpoint", "product": "cloudguard_network", "versions": [{"status": "affected", "version": "r80.40"}, {"status": "affected", "version": "r81"}, {"status": "affected", "version": "r81.10"}, {"status": "affected", "version": "r81.20"}], "defaultStatus": "unknown"}, {"cpes": ["cpe:2.3:a:checkpoint:cloudguard_network:r80.40:*:*:*:*:*:*:*"], "vendor": "checkpoint", "product": "cloudguard_network", "versions": [{"status": "affected", "version": "r80.40"}, {"status": "affected", "version": "r81"}, {"status": "affected", "version": "r81.10"}, {"status": "affected", "version": "r81.20"}], "defaultStatus": "unknown"}, {"cpes": ["cpe:2.3:a:checkpoint:quantum_spark_appliances:r80.40:*:*:*:*:*:*:*"], "vendor": "checkpoint", "product": "quantum_spark_appliances", "versions": [{"status": "affected", "version": "r80.40"}, {"status": "affected", "version": "r81"}, {"status": "affected", "version": "r81.10"}, {"status": "affected", "version": "r81.20"}], "defaultStatus": "unknown"}, {"cpes": ["cpe:2.3:a:checkpoint:quantum_spark_appliances:r80.40:*:*:*:*:*:*:*"], "vendor": "checkpoint", "product": "quantum_spark_appliances", "versions": [{"status": "affected", "version": "r80.40"}, {"status": "affected", "version": "r81"}, {"status": "affected", "version": "r81.10"}, {"status": "affected", "version": "r81.20"}], "defaultStatus": "unknown"}, {"cpes": ["cpe:2.3:a:checkpoint:quantum_spark_appliances:r80.40:*:*:*:*:*:*:*"], "vendor": "checkpoint", "product": "quantum_spark_appliances", "versions": [{"status": "affected", "version": "r80.40"}, {"status": "affected", "version": "r81"}, {"status": "affected", "version": "r81.10"}, {"status": "affected", "version": "r81.20"}], "defaultStatus": "unknown"}, {"cpes": ["cpe:2.3:a:checkpoint:quantum_spark_appliances:r80.40:*:*:*:*:*:*:*"], "vendor": "checkpoint", "product": "quantum_spark_appliances", "versions": [{"status": "affected", "version": "r80.40"}, {"status": "affected", "version": "r81"}, {"status": "affected", "version": "r81.10"}, {"status": "affected", "version": "r81.20"}], "defaultStatus": "unknown"}], "references": [{"url": "https://www.mnemonic.io/resources/blog/advisory-check-point-remote-access-vpn-vulnerability-cve-2024-24919/", "tags": ["exploit"]}, {"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-24919", "tags": ["government-resource"]}], "timeline": [{"lang": "en", "time": "2024-05-30T00:00:00+00:00", "value": "CVE-2024-24919 added to CISA KEV"}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2025-10-21T23:05:17.408Z"}}, {"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-01T23:36:20.565Z"}, "title": "CVE Program Container", "references": [{"url": "https://support.checkpoint.com/results/sk/sk182336", "tags": ["x_transferred"]}]}]}}