PatchSiren

PatchSiren cyber security CVE debrief

CVE-2024-24919 Check Point CVE debrief

CVE-2024-24919 is an information disclosure vulnerability affecting Check Point Quantum Security Gateways. CISA added it to the Known Exploited Vulnerabilities (KEV) catalog on 2024-05-30, which means it is considered actively exploited and time-sensitive for defenders. CISA also marks it as associated with known ransomware campaign use. Organizations should prioritize the vendor guidance referenced by CISA and, if mitigations are not available, follow CISA’s direction to discontinue use of the product.

Vendor
Check Point
Product
Quantum Security Gateways
CVSS
Unknown
CISA KEV
Listed
Original CVE published
2024-05-30
Original CVE updated
2024-05-30
Advisory published
2024-05-30
Advisory updated
2024-05-30

Who should care

Security, network, and infrastructure teams running Check Point Quantum Security Gateways; vulnerability management and incident response teams; MSSPs and managed security teams supporting customers with Check Point perimeter or gateway deployments.

Technical summary

The supplied source corpus identifies the issue as an information disclosure vulnerability in Check Point Quantum Security Gateways. The KEV entry points to Check Point advisory sk182336 and NVD as references, but the corpus does not include the full advisory text, affected versions, attack path, or impact specifics. Based on the KEV record alone, defenders should treat this as a publicly known, exploited disclosure risk requiring immediate mitigation planning.

Defensive priority

Immediate

Recommended defensive actions

  • Review Check Point’s vendor guidance referenced by CISA (support.checkpoint.com/results/sk/sk182336) and apply all available mitigations as soon as possible.
  • If mitigations are unavailable or cannot be deployed safely, follow CISA guidance to discontinue use of the product.
  • Inventory all Check Point Quantum Security Gateways instances and prioritize any internet-facing or externally reachable deployments for remediation.
  • Validate whether sensitive configuration data, credentials, or logs could have been exposed and rotate secrets if exposure is suspected.
  • Monitor gateway and adjacent security logs for signs of unauthorized access or abnormal information access during and after remediation.

Evidence notes

Evidence is limited to the supplied CISA KEV source item metadata and the listed official reference links. The CISA KEV metadata identifies CVE-2024-24919 as a Check Point Quantum Security Gateways information disclosure vulnerability, added on 2024-05-30 with a due date of 2024-06-20 and marked as known ransomware campaign use. The source item notes reference Check Point advisory sk182336 and the NVD record, but those pages were not provided in the corpus, so no additional technical details are asserted here.

Official resources

Publicly disclosed and listed by CISA as a Known Exploited Vulnerability on 2024-05-30.