<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Patch Installation Example (CVE-2024-24919) in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Patch-Installation-Example-CVE-2024-24919/m-p/215685#M35666</link>
    <description>&lt;P&gt;To solve the CVE-2024-24919 issue&amp;nbsp; &lt;A href="https://support.checkpoint.com/results/sk/sk182336" target="_blank" rel="noopener noreferrer"&gt;sk182336&lt;/A&gt;, the following must be done on the Check Point Gateway.&lt;BR /&gt;&lt;BR /&gt;1) First create a snapshot of the gateway&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FIX_5_gdfgdfgfdg.png" style="width: 706px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25948i29C96C59C2D1A1D5/image-dimensions/706x493?v=v2" width="706" height="493" role="button" title="FIX_5_gdfgdfgfdg.png" alt="FIX_5_gdfgdfgfdg.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;2) Open the GAIA PORTAL and check if the latest jumbo hotfix is installed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FIX_3_gdfgdfgfdg.png" style="width: 278px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25945iE8C95EEB5783C05E/image-dimensions/278x368?v=v2" width="278" height="368" role="button" title="FIX_3_gdfgdfgfdg.png" alt="FIX_3_gdfgdfgfdg.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp; 3) For R81.20 this would currently be Take 53. If this is not installed, install it. If this Take is already installed, you can skip the step.&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; a) Download this Take&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; b) Verify the Take&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; c) Install this Take&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FIX_6_gdfgdfgfdg.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25949i0C47B25845DF4646/image-size/large?v=v2&amp;amp;px=999" role="button" title="FIX_6_gdfgdfgfdg.png" alt="FIX_6_gdfgdfgfdg.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;4) Reboot the Security Gateway&lt;BR /&gt;&lt;BR /&gt;CVE-2024-24919 on top hotfixes are currently available for the following gateway versions &lt;A href="https://support.checkpoint.com/results/sk/sk182336" target="_self"&gt;sk182336.&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FIX_9_gdfgdfgfdg.png" style="width: 391px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25952i5F15743B61E6B795/image-dimensions/391x420?v=v2" width="391" height="420" role="button" title="FIX_9_gdfgdfgfdg.png" alt="FIX_9_gdfgdfgfdg.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;5) Afterwards install the special hotfix for the corresponding Jumbo Hotfix version and GAIA version.&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; a) Download this hotfix&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; b) Verify this hotfix &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; c) Install this hotfix&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FIX_7_gdfgdfgfdg.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25950i5D605F79A69EFA48/image-size/large?v=v2&amp;amp;px=999" role="button" title="FIX_7_gdfgdfgfdg.png" alt="FIX_7_gdfgdfgfdg.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT style="--darkreader-inline-color: #ff1a1a;" color="#FF0000" data-darkreader-inline-color=""&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;/STRONG&gt;6) If you want to prevent users from logging in with their password, you should also install this patch.&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; This disables the VPN login for password-only users.&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; a) Download this "Security hardening for Remote Access user" patch&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; b) Verify this patch &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; c) Install this patch&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FIX_10_gdfgdfgfdg.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25997i978B488156F0A8D4/image-size/large?v=v2&amp;amp;px=999" role="button" title="FIX_10_gdfgdfgfdg.png" alt="FIX_10_gdfgdfgfdg.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT style="--darkreader-inline-color: #e8e6e3;" color="#000000" data-darkreader-inline-color=""&gt;PS:&lt;BR /&gt;The same steps are also possible via SmartConsole.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 31 May 2024 20:18:44 GMT</pubDate>
    <dc:creator>HeikoAnkenbrand</dc:creator>
    <dc:date>2024-05-31T20:18:44Z</dc:date>
    <item>
      <title>Patch Installation Example (CVE-2024-24919)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Patch-Installation-Example-CVE-2024-24919/m-p/215685#M35666</link>
      <description>&lt;P&gt;To solve the CVE-2024-24919 issue&amp;nbsp; &lt;A href="https://support.checkpoint.com/results/sk/sk182336" target="_blank" rel="noopener noreferrer"&gt;sk182336&lt;/A&gt;, the following must be done on the Check Point Gateway.&lt;BR /&gt;&lt;BR /&gt;1) First create a snapshot of the gateway&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FIX_5_gdfgdfgfdg.png" style="width: 706px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25948i29C96C59C2D1A1D5/image-dimensions/706x493?v=v2" width="706" height="493" role="button" title="FIX_5_gdfgdfgfdg.png" alt="FIX_5_gdfgdfgfdg.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;2) Open the GAIA PORTAL and check if the latest jumbo hotfix is installed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FIX_3_gdfgdfgfdg.png" style="width: 278px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25945iE8C95EEB5783C05E/image-dimensions/278x368?v=v2" width="278" height="368" role="button" title="FIX_3_gdfgdfgfdg.png" alt="FIX_3_gdfgdfgfdg.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp; 3) For R81.20 this would currently be Take 53. If this is not installed, install it. If this Take is already installed, you can skip the step.&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; a) Download this Take&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; b) Verify the Take&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; c) Install this Take&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FIX_6_gdfgdfgfdg.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25949i0C47B25845DF4646/image-size/large?v=v2&amp;amp;px=999" role="button" title="FIX_6_gdfgdfgfdg.png" alt="FIX_6_gdfgdfgfdg.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;4) Reboot the Security Gateway&lt;BR /&gt;&lt;BR /&gt;CVE-2024-24919 on top hotfixes are currently available for the following gateway versions &lt;A href="https://support.checkpoint.com/results/sk/sk182336" target="_self"&gt;sk182336.&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FIX_9_gdfgdfgfdg.png" style="width: 391px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25952i5F15743B61E6B795/image-dimensions/391x420?v=v2" width="391" height="420" role="button" title="FIX_9_gdfgdfgfdg.png" alt="FIX_9_gdfgdfgfdg.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;5) Afterwards install the special hotfix for the corresponding Jumbo Hotfix version and GAIA version.&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; a) Download this hotfix&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; b) Verify this hotfix &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; c) Install this hotfix&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FIX_7_gdfgdfgfdg.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25950i5D605F79A69EFA48/image-size/large?v=v2&amp;amp;px=999" role="button" title="FIX_7_gdfgdfgfdg.png" alt="FIX_7_gdfgdfgfdg.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT style="--darkreader-inline-color: #ff1a1a;" color="#FF0000" data-darkreader-inline-color=""&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;/STRONG&gt;6) If you want to prevent users from logging in with their password, you should also install this patch.&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; This disables the VPN login for password-only users.&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; a) Download this "Security hardening for Remote Access user" patch&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; b) Verify this patch &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; c) Install this patch&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FIX_10_gdfgdfgfdg.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25997i978B488156F0A8D4/image-size/large?v=v2&amp;amp;px=999" role="button" title="FIX_10_gdfgdfgfdg.png" alt="FIX_10_gdfgdfgfdg.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT style="--darkreader-inline-color: #e8e6e3;" color="#000000" data-darkreader-inline-color=""&gt;PS:&lt;BR /&gt;The same steps are also possible via SmartConsole.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 20:18:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Patch-Installation-Example-CVE-2024-24919/m-p/215685#M35666</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2024-05-31T20:18:44Z</dc:date>
    </item>
    <item>
      <title>Re: Patch Installation Example (CVE-2024-24919)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Patch-Installation-Example-CVE-2024-24919/m-p/215710#M35671</link>
      <description>&lt;P&gt;More read here:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215310#M35533" target="_self"&gt;Important security update - stay protected against VPN Information Disclosure (CVE-2024-24919)&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 May 2024 14:10:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Patch-Installation-Example-CVE-2024-24919/m-p/215710#M35671</guid>
      <dc:creator>mylly</dc:creator>
      <dc:date>2024-05-30T14:10:03Z</dc:date>
    </item>
    <item>
      <title>Re: Patch Installation Example (CVE-2024-24919)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Patch-Installation-Example-CVE-2024-24919/m-p/215725#M35679</link>
      <description>&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 May 2024 14:38:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Patch-Installation-Example-CVE-2024-24919/m-p/215725#M35679</guid>
      <dc:creator>OTWal</dc:creator>
      <dc:date>2024-05-30T14:38:44Z</dc:date>
    </item>
    <item>
      <title>Re: Patch Installation Example (CVE-2024-24919)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Patch-Installation-Example-CVE-2024-24919/m-p/215894#M35770</link>
      <description>&lt;P&gt;Heiko, thanks for the effort, but we do have &lt;A href="https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/td-p/215310" target="_self"&gt;official recommendations for this CVE in the main announcement post&lt;/A&gt;&amp;nbsp;already.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 10:48:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Patch-Installation-Example-CVE-2024-24919/m-p/215894#M35770</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2024-05-31T10:48:10Z</dc:date>
    </item>
  </channel>
</rss>

