Skip to content

Identified Vulnerability Linked by Check Point Software to Assaults via Virtual Private Networks

Company insists on customers downloading a security update aimed at warding off potential intruders.

Identified Vulnerability in Check Point Software Linked to Assaults via Virtual Private Networks
Identified Vulnerability in Check Point Software Linked to Assaults via Virtual Private Networks

Identified Vulnerability Linked by Check Point Software to Assaults via Virtual Private Networks

In recent months, a wide range of threat actors, from nation-state affiliates to criminal groups, have launched attacks on VPN environments, according to cybersecurity firm Check Point Software. One such vulnerability that has come to light is CVE-2024-24919, which was identified by Check Point Software in remote access VPNs. This vulnerability allows attackers to read certain information on internet-connected gateways.

Check Point Software's teams have been monitoring threat activity closely, and they have found that high-profile organizations have been successfully hacked even after following all mitigation instructions and applying patches. For instance, Comcast's Xfinity unit was hacked in 2023, despite claiming to have followed the recommended mitigations from Citrix.

Gil Messing, chief of staff at Check Point Software, stated that the hotfix for CVE-2024-24919 works effectively and is easy to install. However, as of the latest available information, there are no publicly known or officially documented workarounds for this vulnerability fix.

The National Vulnerability Database has not yet analyzed the vulnerability, and the search results do not reference this CVE directly or mention any temporary mitigations or bypasses aside from applying the vendor's official patch.

If mitigation is required before patch deployment, standard compensatory controls might include restricting VPN access to trusted IPs, enhancing monitoring for anomalous VPN activity, and temporarily disabling vulnerable VPN components. However, these steps are not confirmed as effective workarounds for this particular CVE.

Check Point Software has made it mandatory for customers to install a hotfix to prevent successful exploitation of the vulnerability. The company is also collaborating with incident response specialists, technical service, and product security experts to investigate the attacks. They have notified cybersecurity authorities about the attacks and are on constant alert about any potential future instances.

As corporate stakeholders seek to better understand the risk calculus of their technology stacks, they are questioning whether they are potential targets. For the most accurate and up-to-date guidance, it is advisable to consult Check Point Software’s official security advisories and support channels directly. It is unknown whether hackers will be able to find workarounds against the fix, but Check Point Software confirmed it is monitoring the situation to make sure there aren't any future attempts to bypass protections.

  1. Despite following all mitigation instructions and applying patches, high-profile organizations have fallen victim to ransomware attacks, as seen with Comcast's Xfinity unit in 2023.
  2. Gil Messing, the chief of staff at Check Point Software, affirmed that the hotfix for CVE-2024-24919 is easy to install and effective, but as of now, there are no publicly known or officially documented workarounds for this vulnerability fix.
  3. In the absence of a confirmed workaround before patch deployment, possible compensatory controls include restricting VPN access to trusted IPs, enhancing monitoring for anomalous VPN activity, and temporarily disabling vulnerable VPN components.
  4. Check Point Software is collaborating with incident response specialists, technical service, and product security experts, notifying cybersecurity authorities about the attacks, and maintaining a constant alert for any potential future instances involving this vulnerability.

Read also:

    Latest