CVE-2024-24919
Checkpoint Arbitrary File Read
Introduction
| Remote | ✅ |
| Authenticated | ❌ |
| Default config | ✅ |
| Source | 🌍 |
Affected Products
- CloudGuard Network
- Quantum Maestro
- Quantum Scalable Chassis
- Quantum Security Gateways
- Quantum Spark Appliances
Affected Versions
- R77.20 (EOL)
- R77.30 (EOL)
- R80.10 (EOL)
- R80.20 (EOL)
- R80.20.x
- R80.20SP (EOL)
- R80.30 (EOL)
- R80.30SP (EOL)
- R80.40 (EOL)
- R81
- R81.10
- R81.10.x
- R81.20
Details
Detection
The content reveals that the endpoint used is /clients/MyCRL. Even more concerning, this endpoint allows a file name to be specified for download (either via the URL or through a POST request).
The rest of the analysis details the protections implemented by the vendor, as well as a potential workaround that led to this vulnerability. Although the list of downloadable files is typically defined within a set list, the use of the strstr function means that in reality, the presence of just one of these character strings is enough to bypass this protection. The remainder of the attack is essentially a classic Path Traversal.
Currently, the Aioniq solution can detect the initial compromise through the following rule:
| 2053031 | ET WEB_SPECIFIC_APPS Checkpoint Quantum Security Gateway Arbitrary File Read Attempt (CVE-2024-24919) |
Correction
The vendor has already released a patch for this vulnerability. For versions that are end-of-life, the vendor encourages users to update their equipment and apply the hotfix. If this is not possible, users should disable remote and mobile access.
As highlighted by Watchtowr in their analysis, the consequences of a successful exploitation of this vulnerability are far more significant than the description suggests.