PatchSiren cyber security CVE debrief
CVE-2024-24919 Check Point CVE debrief
CVE-2024-24919 is an information disclosure vulnerability affecting Check Point Quantum Security Gateways. CISA added it to the Known Exploited Vulnerabilities (KEV) catalog on 2024-05-30, which means it is considered actively exploited and time-sensitive for defenders. CISA also marks it as associated with known ransomware campaign use. Organizations should prioritize the vendor guidance referenced by CISA and, if mitigations are not available, follow CISA’s direction to discontinue use of the product.
- Vendor
- Check Point
- Product
- Quantum Security Gateways
- CVSS
- Unknown
- CISA KEV
- Listed
- Original CVE published
- 2024-05-30
- Original CVE updated
- 2024-05-30
- Advisory published
- 2024-05-30
- Advisory updated
- 2024-05-30
Who should care
Security, network, and infrastructure teams running Check Point Quantum Security Gateways; vulnerability management and incident response teams; MSSPs and managed security teams supporting customers with Check Point perimeter or gateway deployments.
Technical summary
The supplied source corpus identifies the issue as an information disclosure vulnerability in Check Point Quantum Security Gateways. The KEV entry points to Check Point advisory sk182336 and NVD as references, but the corpus does not include the full advisory text, affected versions, attack path, or impact specifics. Based on the KEV record alone, defenders should treat this as a publicly known, exploited disclosure risk requiring immediate mitigation planning.
Defensive priority
Immediate
Recommended defensive actions
- Review Check Point’s vendor guidance referenced by CISA (support.checkpoint.com/results/sk/sk182336) and apply all available mitigations as soon as possible.
- If mitigations are unavailable or cannot be deployed safely, follow CISA guidance to discontinue use of the product.
- Inventory all Check Point Quantum Security Gateways instances and prioritize any internet-facing or externally reachable deployments for remediation.
- Validate whether sensitive configuration data, credentials, or logs could have been exposed and rotate secrets if exposure is suspected.
- Monitor gateway and adjacent security logs for signs of unauthorized access or abnormal information access during and after remediation.
Evidence notes
Evidence is limited to the supplied CISA KEV source item metadata and the listed official reference links. The CISA KEV metadata identifies CVE-2024-24919 as a Check Point Quantum Security Gateways information disclosure vulnerability, added on 2024-05-30 with a due date of 2024-06-20 and marked as known ransomware campaign use. The source item notes reference Check Point advisory sk182336 and the NVD record, but those pages were not provided in the corpus, so no additional technical details are asserted here.
Official resources
-
CVE-2024-24919 CVE record
CVE.org
-
CVE-2024-24919 NVD detail
NVD
-
CISA Known Exploited Vulnerabilities catalog
CISA - Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
-
Source item URL
cisa_kev
Publicly disclosed and listed by CISA as a Known Exploited Vulnerability on 2024-05-30.