{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T11:43:04.240","vulnerabilities":[{"cve":{"id":"CVE-2024-24919","sourceIdentifier":"cve@checkpoint.com","published":"2024-05-28T19:15:10.060","lastModified":"2025-10-24T13:54:22.343","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available."},{"lang":"es","value":"Potencialmente, permitir que un atacante lea cierta información en Check Point Security Gateways una vez conectado a Internet y habilitado con VPN de acceso remoto o software Blades de acceso móvil. Hay disponible una solución de seguridad que mitiga esta vulnerabilidad."}],"metrics":{"cvssMetricV31":[{"source":"cve@checkpoint.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":4.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":4.0}]},"cisaExploitAdd":"2024-05-30","cisaActionDue":"2024-06-20","cisaRequiredAction":"Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.","cisaVulnerabilityName":"Check Point Quantum Security Gateways Information Disclosure Vulnerability","weaknesses":[{"source":"cve@checkpoint.com","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:checkpoint:quantum_spark_firmware:r80.40:*:*:*:*:*:*:*","matchCriteriaId":"362E95B3-0727-4516-A80F-A48CC96D60FC"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:checkpoint:quantum_spark:-:*:*:*:*:*:*:*","matchCriteriaId":"FC94897D-88D2-4F56-BEBC-04899FE17197"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:checkpoint:quantum_spark_firmware:r81:*:*:*:*:*:*:*","matchCriteriaId":"CA87CADC-39F9-45F9-9795-02C496691997"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:checkpoint:quantum_spark:-:*:*:*:*:*:*:*","matchCriteriaId":"FC94897D-88D2-4F56-BEBC-04899FE17197"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:checkpoint:quantum_security_gateway_firmware:r80.40:*:*:*:*:*:*:*","matchCriteriaId":"A0002A29-8B42-445D-9EC4-58BC93194241"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:checkpoint:quantum_security_gateway:-:*:*:*:*:*:*:*","matchCriteriaId":"9016DDF6-285C-4E64-88D0-29ECCEF048F8"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:checkpoint:cloudguard_network_security:r80.40:*:*:*:*:*:*:*","matchCriteriaId":"A382E0DC-2BBA-4EC9-A695-8062C3DC405D"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkpoint:cloudguard_network_security:r81:*:*:*:*:*:*:*","matchCriteriaId":"BB6D99AA-2186-44F1-A1B0-C9F9EEDE8CF1"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkpoint:cloudguard_network_security:r81.10:*:*:*:*:*:*:*","matchCriteriaId":"4FCE5DC3-745A-4FC4-A2EF-AC4931E2A630"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkpoint:cloudguard_network_security:r81.20:*:*:*:*:*:*:*","matchCriteriaId":"121E2863-57A8-41F1-B7E0-B41600959A5E"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:checkpoint:quantum_security_gateway_firmware:r81.20:*:*:*:*:*:*:*","matchCriteriaId":"26705EAD-B1B6-40DB-8C10-1070E92E86F3"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:checkpoint:quantum_security_gateway:-:*:*:*:*:*:*:*","matchCriteriaId":"9016DDF6-285C-4E64-88D0-29ECCEF048F8"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:checkpoint:quantum_security_gateway_firmware:r81.10:*:*:*:*:*:*:*","matchCriteriaId":"AD9F864E-435C-4753-9831-EDBE4ABD7B31"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:checkpoint:quantum_security_gateway:-:*:*:*:*:*:*:*","matchCriteriaId":"9016DDF6-285C-4E64-88D0-29ECCEF048F8"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:checkpoint:quantum_security_gateway_firmware:r81:*:*:*:*:*:*:*","matchCriteriaId":"3B0EDB21-9305-4601-AB96-A77BD00F311D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:checkpoint:quantum_security_gateway:-:*:*:*:*:*:*:*","matchCriteriaId":"9016DDF6-285C-4E64-88D0-29ECCEF048F8"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:checkpoint:quantum_spark_firmware:r81.10:*:*:*:*:*:*:*","matchCriteriaId":"BD5A3388-8310-4FA4-AD07-771F2E983674"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:checkpoint:quantum_spark:-:*:*:*:*:*:*:*","matchCriteriaId":"FC94897D-88D2-4F56-BEBC-04899FE17197"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:checkpoint:quantum_spark_firmware:r80.20:*:*:*:*:*:*:*","matchCriteriaId":"0F325578-5CB0-486A-BD44-18E4BFB52441"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:checkpoint:quantum_spark:-:*:*:*:*:*:*:*","matchCriteriaId":"FC94897D-88D2-4F56-BEBC-04899FE17197"}]}]}],"references":[{"url":"https://support.checkpoint.com/results/sk/sk182336","source":"cve@checkpoint.com","tags":["Mitigation","Patch","Vendor Advisory"]},{"url":"https://support.checkpoint.com/results/sk/sk182336","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mitigation","Patch","Vendor Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-24919","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]},{"url":"https://www.mnemonic.io/resources/blog/advisory-check-point-remote-access-vpn-vulnerability-cve-2024-24919/","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Third Party Advisory"]}]}}]}