{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-13T22:55:13.464","vulnerabilities":[{"cve":{"id":"CVE-2024-24911","sourceIdentifier":"cve@checkpoint.com","published":"2025-02-06T14:15:29.577","lastModified":"2025-10-15T16:33:11.120","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In rare scenarios, the cpca process on the Security Management Server / Domain Management Server may exit unexpectedly, creating a core dump file. When the cpca process is down, VPN and SIC connectivity issues may occur if the CRL is not present in the Security Gateway's CRL cache."},{"lang":"es","value":"En casos excepcionales, el proceso cpca en el servidor de administración de seguridad o servidor de administración de dominio puede cerrarse inesperadamente y crear un archivo de volcado de memoria. Cuando el proceso cpca deja de funcionar, pueden surgir problemas de conectividad de VPN y SIC si la CRL no está presente en la caché de CRL de Security Gateway."}],"metrics":{"cvssMetricV31":[{"source":"cve@checkpoint.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"cve@checkpoint.com","type":"Secondary","description":[{"lang":"en","value":"CWE-125"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:checkpoint:gaia_os:r81:*:*:*:*:*:*:*","matchCriteriaId":"C580EA73-A731-497E-885E-F00854E07EA9"},{"vulnerable":true,"criteria":"cpe:2.3:o:checkpoint:gaia_os:r81.10:*:*:*:*:*:*:*","matchCriteriaId":"55864700-51C8-4540-B4B2-05CE4C7FC245"},{"vulnerable":true,"criteria":"cpe:2.3:o:checkpoint:gaia_os:r81.20:*:*:*:*:*:*:*","matchCriteriaId":"3BE80E1E-02E1-44E3-B309-3079F0F5A89C"},{"vulnerable":true,"criteria":"cpe:2.3:o:checkpoint:gaia_os:r82:*:*:*:*:*:*:*","matchCriteriaId":"6443AE50-1CB5-4D00-8C8D-97DB966687DD"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:checkpoint:multi-domain_management:-:*:*:*:*:*:*:*","matchCriteriaId":"1584E1B4-412C-40E2-BF07-4E464692F2AE"},{"vulnerable":false,"criteria":"cpe:2.3:h:checkpoint:quantum_security_management:-:*:*:*:*:*:*:*","matchCriteriaId":"08601413-25E2-4977-B67A-C11A9D788EA8"}]}]}],"references":[{"url":"https://support.checkpoint.com/results/sk/sk183101","source":"cve@checkpoint.com","tags":["Vendor Advisory"]}]}}]}