Vulnerabilites related to checkpoint - quantum_spark
Vulnerability from fkie_nvd
Published
2024-11-07 12:15
Modified
2025-08-26 16:40
Severity ?
Summary
Authenticated Gaia users can inject code or commands by global variables through special HTTP requests. A Security fix that mitigates this vulnerability is available.
References
▼ | URL | Tags | |
---|---|---|---|
cve@checkpoint.com | https://support.checkpoint.com/results/sk/sk182743 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
checkpoint | gaia_os | r81 | |
checkpoint | gaia_os | r81.10 | |
checkpoint | gaia_os | r81.20 | |
checkpoint | clusterxl | - | |
checkpoint | multi-domain_management | - | |
checkpoint | quantum_6700 | - | |
checkpoint | quantum_maestro | - | |
checkpoint | quantum_scalable_chassis | - | |
checkpoint | quantum_security_gateway | - | |
checkpoint | quantum_security_management | - | |
checkpoint | quantum_spark | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:checkpoint:gaia_os:r81:*:*:*:*:*:*:*", "matchCriteriaId": "C580EA73-A731-497E-885E-F00854E07EA9", "vulnerable": true }, { "criteria": "cpe:2.3:o:checkpoint:gaia_os:r81.10:*:*:*:*:*:*:*", "matchCriteriaId": "55864700-51C8-4540-B4B2-05CE4C7FC245", "vulnerable": true }, { "criteria": "cpe:2.3:o:checkpoint:gaia_os:r81.20:*:*:*:*:*:*:*", "matchCriteriaId": "3BE80E1E-02E1-44E3-B309-3079F0F5A89C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:checkpoint:clusterxl:-:*:*:*:*:*:*:*", "matchCriteriaId": "99149C44-7498-44F9-8771-FD37CA2BE738", "vulnerable": false }, { "criteria": "cpe:2.3:h:checkpoint:multi-domain_management:-:*:*:*:*:*:*:*", "matchCriteriaId": "1584E1B4-412C-40E2-BF07-4E464692F2AE", "vulnerable": false }, { "criteria": "cpe:2.3:h:checkpoint:quantum_6700:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA698703-C5F2-4EA2-B272-0B0A0D26E2FD", "vulnerable": false }, { "criteria": "cpe:2.3:h:checkpoint:quantum_maestro:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C9C13E7-3B79-4AC8-B559-266DDE871169", "vulnerable": false }, { "criteria": "cpe:2.3:h:checkpoint:quantum_scalable_chassis:-:*:*:*:*:*:*:*", "matchCriteriaId": "2411E997-F970-4F47-AA08-B8F1A06EBB3E", "vulnerable": false }, { "criteria": "cpe:2.3:h:checkpoint:quantum_security_gateway:-:*:*:*:*:*:*:*", "matchCriteriaId": "9016DDF6-285C-4E64-88D0-29ECCEF048F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:checkpoint:quantum_security_management:-:*:*:*:*:*:*:*", "matchCriteriaId": "08601413-25E2-4977-B67A-C11A9D788EA8", "vulnerable": false }, { "criteria": "cpe:2.3:h:checkpoint:quantum_spark:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC94897D-88D2-4F56-BEBC-04899FE17197", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Authenticated Gaia users can inject code or commands by global variables through special HTTP requests. A Security fix that mitigates this vulnerability is available." }, { "lang": "es", "value": "Los usuarios autenticados de Gaia pueden inyectar c\u00f3digo o comandos mediante variables globales a trav\u00e9s de solicitudes HTTP especiales. Hay disponible una soluci\u00f3n de seguridad que mitiga esta vulnerabilidad." } ], "id": "CVE-2024-24914", "lastModified": "2025-08-26T16:40:18.067", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 5.9, "source": "cve@checkpoint.com", "type": "Secondary" } ] }, "published": "2024-11-07T12:15:24.327", "references": [ { "source": "cve@checkpoint.com", "tags": [ "Vendor Advisory" ], "url": "https://support.checkpoint.com/results/sk/sk182743" } ], "sourceIdentifier": "cve@checkpoint.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-914" } ], "source": "cve@checkpoint.com", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2024-05-28 19:15
Modified
2025-07-30 19:25
Severity ?
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Summary
Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available.
References
▼ | URL | Tags | |
---|---|---|---|
cve@checkpoint.com | https://support.checkpoint.com/results/sk/sk182336 | Mitigation, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.checkpoint.com/results/sk/sk182336 | Mitigation, Patch, Vendor Advisory | |
134c704f-9b21-4f2e-91b3-4a467353bcc0 | https://www.mnemonic.io/resources/blog/advisory-check-point-remote-access-vpn-vulnerability-cve-2024-24919/ | Third Party Advisory |
Impacted products
{ "cisaActionDue": "2024-06-20", "cisaExploitAdd": "2024-05-30", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "Check Point Quantum Security Gateways Information Disclosure Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:checkpoint:quantum_spark_firmware:r80.40:*:*:*:*:*:*:*", "matchCriteriaId": "362E95B3-0727-4516-A80F-A48CC96D60FC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:checkpoint:quantum_spark:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC94897D-88D2-4F56-BEBC-04899FE17197", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:checkpoint:quantum_spark_firmware:r81:*:*:*:*:*:*:*", "matchCriteriaId": "CA87CADC-39F9-45F9-9795-02C496691997", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:checkpoint:quantum_spark:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC94897D-88D2-4F56-BEBC-04899FE17197", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:checkpoint:quantum_security_gateway_firmware:r80.40:*:*:*:*:*:*:*", "matchCriteriaId": "A0002A29-8B42-445D-9EC4-58BC93194241", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:checkpoint:quantum_security_gateway:-:*:*:*:*:*:*:*", "matchCriteriaId": "9016DDF6-285C-4E64-88D0-29ECCEF048F8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:checkpoint:cloudguard_network_security:r80.40:*:*:*:*:*:*:*", "matchCriteriaId": "A382E0DC-2BBA-4EC9-A695-8062C3DC405D", "vulnerable": true }, { "criteria": "cpe:2.3:a:checkpoint:cloudguard_network_security:r81:*:*:*:*:*:*:*", "matchCriteriaId": "BB6D99AA-2186-44F1-A1B0-C9F9EEDE8CF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:checkpoint:cloudguard_network_security:r81.10:*:*:*:*:*:*:*", "matchCriteriaId": "4FCE5DC3-745A-4FC4-A2EF-AC4931E2A630", "vulnerable": true }, { "criteria": "cpe:2.3:a:checkpoint:cloudguard_network_security:r81.20:*:*:*:*:*:*:*", "matchCriteriaId": "121E2863-57A8-41F1-B7E0-B41600959A5E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:checkpoint:quantum_security_gateway_firmware:r81.20:*:*:*:*:*:*:*", "matchCriteriaId": "26705EAD-B1B6-40DB-8C10-1070E92E86F3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:checkpoint:quantum_security_gateway:-:*:*:*:*:*:*:*", "matchCriteriaId": "9016DDF6-285C-4E64-88D0-29ECCEF048F8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:checkpoint:quantum_security_gateway_firmware:r81.10:*:*:*:*:*:*:*", "matchCriteriaId": "AD9F864E-435C-4753-9831-EDBE4ABD7B31", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:checkpoint:quantum_security_gateway:-:*:*:*:*:*:*:*", "matchCriteriaId": "9016DDF6-285C-4E64-88D0-29ECCEF048F8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:checkpoint:quantum_security_gateway_firmware:r81:*:*:*:*:*:*:*", "matchCriteriaId": "3B0EDB21-9305-4601-AB96-A77BD00F311D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:checkpoint:quantum_security_gateway:-:*:*:*:*:*:*:*", "matchCriteriaId": "9016DDF6-285C-4E64-88D0-29ECCEF048F8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:checkpoint:quantum_spark_firmware:r81.10:*:*:*:*:*:*:*", "matchCriteriaId": "BD5A3388-8310-4FA4-AD07-771F2E983674", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:checkpoint:quantum_spark:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC94897D-88D2-4F56-BEBC-04899FE17197", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:checkpoint:quantum_spark_firmware:r80.20:*:*:*:*:*:*:*", "matchCriteriaId": "0F325578-5CB0-486A-BD44-18E4BFB52441", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:checkpoint:quantum_spark:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC94897D-88D2-4F56-BEBC-04899FE17197", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available." }, { "lang": "es", "value": "Potencialmente, permitir que un atacante lea cierta informaci\u00f3n en Check Point Security Gateways una vez conectado a Internet y habilitado con VPN de acceso remoto o software Blades de acceso m\u00f3vil. Hay disponible una soluci\u00f3n de seguridad que mitiga esta vulnerabilidad." } ], "id": "CVE-2024-24919", "lastModified": "2025-07-30T19:25:27.690", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.0, "source": "cve@checkpoint.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-05-28T19:15:10.060", "references": [ { "source": "cve@checkpoint.com", "tags": [ "Mitigation", "Patch", "Vendor Advisory" ], "url": "https://support.checkpoint.com/results/sk/sk182336" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Patch", "Vendor Advisory" ], "url": "https://support.checkpoint.com/results/sk/sk182336" }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "tags": [ "Third Party Advisory" ], "url": "https://www.mnemonic.io/resources/blog/advisory-check-point-remote-access-vpn-vulnerability-cve-2024-24919/" } ], "sourceIdentifier": "cve@checkpoint.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "cve@checkpoint.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2024-24919 (GCVE-0-2024-24919)
Vulnerability from cvelistv5
Published
2024-05-28 18:22
Modified
2025-07-30 01:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
checkpoint | Check Point Quantum Gateway, Spark Gateway and CloudGuard Network |
Version: Check Point Quantum Gateway and CloudGuard Network versions R81.20, R81.10, R81, R80.40 and Check Point Spark versions R81.10, R80.20. |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:checkpoint:quantum_security_gateway_firmware:r80.40:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "quantum_security_gateway_firmware", "vendor": "checkpoint", "versions": [ { "status": "affected", "version": "r80.40" }, { "status": "affected", "version": "r81" }, { "status": "affected", "version": "r81.10" }, { "status": "affected", "version": "r81.20" } ] }, { "cpes": [ "cpe:2.3:o:checkpoint:quantum_security_gateway_firmware:r80.40:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "quantum_security_gateway_firmware", "vendor": "checkpoint", "versions": [ { "status": "affected", "version": "r80.40" }, { "status": "affected", "version": "r81" }, { "status": "affected", "version": "r81.10" }, { "status": "affected", "version": "r81.20" } ] }, { "cpes": [ "cpe:2.3:o:checkpoint:quantum_security_gateway_firmware:r80.40:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "quantum_security_gateway_firmware", "vendor": "checkpoint", "versions": [ { "status": "affected", "version": "r80.40" }, { "status": "affected", "version": "r81" }, { "status": "affected", "version": "r81.10" }, { "status": "affected", "version": "r81.20" } ] }, { "cpes": [ "cpe:2.3:o:checkpoint:quantum_security_gateway_firmware:r80.40:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "quantum_security_gateway_firmware", "vendor": "checkpoint", "versions": [ { "status": "affected", "version": "r80.40" }, { "status": "affected", "version": "r81" }, { "status": "affected", "version": "r81.10" }, { "status": "affected", "version": "r81.20" } ] }, { "cpes": [ "cpe:2.3:a:checkpoint:cloudguard_network:r80.40:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "cloudguard_network", "vendor": "checkpoint", "versions": [ { "status": "affected", "version": "r80.40" }, { "status": "affected", "version": "r81" }, { "status": "affected", "version": "r81.10" }, { "status": "affected", "version": "r81.20" } ] }, { "cpes": [ "cpe:2.3:a:checkpoint:cloudguard_network:r80.40:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "cloudguard_network", "vendor": "checkpoint", "versions": [ { "status": "affected", "version": "r80.40" }, { "status": "affected", "version": "r81" }, { "status": "affected", "version": "r81.10" }, { "status": "affected", "version": "r81.20" } ] }, { "cpes": [ "cpe:2.3:a:checkpoint:cloudguard_network:r80.40:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "cloudguard_network", "vendor": "checkpoint", "versions": [ { "status": "affected", "version": "r80.40" }, { "status": "affected", "version": "r81" }, { "status": "affected", "version": "r81.10" }, { "status": "affected", "version": "r81.20" } ] }, { "cpes": [ "cpe:2.3:a:checkpoint:cloudguard_network:r80.40:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "cloudguard_network", "vendor": "checkpoint", "versions": [ { "status": "affected", "version": "r80.40" }, { "status": "affected", "version": "r81" }, { "status": "affected", "version": "r81.10" }, { "status": "affected", "version": "r81.20" } ] }, { "cpes": [ "cpe:2.3:a:checkpoint:quantum_spark_appliances:r80.40:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "quantum_spark_appliances", "vendor": "checkpoint", "versions": [ { "status": "affected", "version": "r80.40" }, { "status": "affected", "version": "r81" }, { "status": "affected", "version": "r81.10" }, { "status": "affected", "version": "r81.20" } ] }, { "cpes": [ "cpe:2.3:a:checkpoint:quantum_spark_appliances:r80.40:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "quantum_spark_appliances", "vendor": "checkpoint", "versions": [ { "status": "affected", "version": "r80.40" }, { "status": "affected", "version": "r81" }, { "status": "affected", "version": "r81.10" }, { "status": "affected", "version": "r81.20" } ] }, { "cpes": [ "cpe:2.3:a:checkpoint:quantum_spark_appliances:r80.40:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "quantum_spark_appliances", "vendor": "checkpoint", "versions": [ { "status": "affected", "version": "r80.40" }, { "status": "affected", "version": "r81" }, { "status": "affected", "version": "r81.10" }, { "status": "affected", "version": "r81.20" } ] }, { "cpes": [ "cpe:2.3:a:checkpoint:quantum_spark_appliances:r80.40:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "quantum_spark_appliances", "vendor": "checkpoint", "versions": [ { "status": "affected", "version": "r80.40" }, { "status": "affected", "version": "r81" }, { "status": "affected", "version": "r81.10" }, { "status": "affected", "version": "r81.20" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-24919", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-31T04:00:11.841700Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2024-05-30", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-24919" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:37:02.834Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://www.mnemonic.io/resources/blog/advisory-check-point-remote-access-vpn-vulnerability-cve-2024-24919/" } ], "timeline": [ { "lang": "en", "time": "2024-05-30T00:00:00+00:00", "value": "CVE-2024-24919 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T23:36:20.565Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.checkpoint.com/results/sk/sk182336" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Check Point Quantum Gateway, Spark Gateway and CloudGuard Network", "vendor": "checkpoint", "versions": [ { "status": "affected", "version": "Check Point Quantum Gateway and CloudGuard Network versions R81.20, R81.10, R81, R80.40 and Check Point Spark versions R81.10, R80.20." } ] } ], "descriptions": [ { "lang": "en", "value": "Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-30T12:40:21.757Z", "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "shortName": "checkpoint" }, "references": [ { "url": "https://support.checkpoint.com/results/sk/sk182336" } ], "title": "Information disclosure" } }, "cveMetadata": { "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "assignerShortName": "checkpoint", "cveId": "CVE-2024-24919", "datePublished": "2024-05-28T18:22:19.401Z", "dateReserved": "2024-02-01T15:19:26.279Z", "dateUpdated": "2025-07-30T01:37:02.834Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-24914 (GCVE-0-2024-24914)
Vulnerability from cvelistv5
Published
2024-11-07 11:25
Modified
2024-11-07 17:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-914 - Improper Control of Dynamically-Identified Variables
Summary
Authenticated Gaia users can inject code or commands by global variables through special HTTP requests. A Security fix that mitigates this vulnerability is available.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
checkpoint | ClusterXL, Multi-Domain Security Management, Quantum Appliances, Quantum Maestro, Quantum Scalable Chassis, Quantum Security Gateways, Quantum Security Management |
Version: Check Point Quantum Gateways versions R81, R81.10, R81.20 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:checkpoint:clusterxl:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "clusterxl", "vendor": "checkpoint", "versions": [ { "status": "affected", "version": "r81" }, { "status": "affected", "version": "r81.10" }, { "status": "affected", "version": "r81.20" } ] }, { "cpes": [ "cpe:2.3:a:checkpoint:multi-domain_management:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "multi-domain_management", "vendor": "checkpoint", "versions": [ { "status": "affected", "version": "r81" }, { "status": "affected", "version": "r81.10" }, { "status": "affected", "version": "r81.20" } ] }, { "cpes": [ "cpe:2.3:a:checkpoint:quantum_appliances:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "quantum_appliances", "vendor": "checkpoint", "versions": [ { "status": "affected", "version": "r81" }, { "status": "affected", "version": "r81.10" }, { "status": "affected", "version": "r81.20" } ] }, { "cpes": [ "cpe:2.3:a:checkpoint:quantum_maestro:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "quantum_maestro", "vendor": "checkpoint", "versions": [ { "status": "affected", "version": "r81" }, { "status": "affected", "version": "r81.10" }, { "status": "affected", "version": "r81.20" } ] }, { "cpes": [ "cpe:2.3:a:checkpoint:quantum_scalable_chassis:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "quantum_scalable_chassis", "vendor": "checkpoint", "versions": [ { "status": "affected", "version": "r81" }, { "status": "affected", "version": "r81.10" }, { "status": "affected", "version": "r81.20" } ] }, { "cpes": [ "cpe:2.3:a:checkpoint:quantum_security_gateway:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "quantum_security_gateway", "vendor": "checkpoint", "versions": [ { "status": "affected", "version": "r81" }, { "status": "affected", "version": "r81.10" }, { "status": "affected", "version": "r81.20" } ] }, { "cpes": [ "cpe:2.3:a:checkpoint:quantum_security_management:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "quantum_security_management", "vendor": "checkpoint", "versions": [ { "status": "affected", "version": "r81" }, { "status": "affected", "version": "r81.10" }, { "status": "affected", "version": "r81.20" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-24914", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-07T16:56:57.795526Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-07T17:33:31.286Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "ClusterXL, Multi-Domain Security Management, Quantum Appliances, Quantum Maestro, Quantum Scalable Chassis, Quantum Security Gateways, Quantum Security Management", "vendor": "checkpoint", "versions": [ { "status": "affected", "version": "Check Point Quantum Gateways versions R81, R81.10, R81.20" } ] } ], "descriptions": [ { "lang": "en", "value": "Authenticated Gaia users can inject code or commands by global variables through special HTTP requests. A Security fix that mitigates this vulnerability is available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-914", "description": "CWE-914: Improper Control of Dynamically-Identified Variables", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-07T11:25:53.238Z", "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "shortName": "checkpoint" }, "references": [ { "url": "https://support.checkpoint.com/results/sk/sk182743" } ] } }, "cveMetadata": { "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "assignerShortName": "checkpoint", "cveId": "CVE-2024-24914", "datePublished": "2024-11-07T11:25:53.238Z", "dateReserved": "2024-02-01T15:19:26.278Z", "dateUpdated": "2024-11-07T17:33:31.286Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }