<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Notes on Script to Identify vulnerable Security Gateways for CVE-2024-24919 in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/215921#M35781</link>
    <description>&lt;P&gt;I just re read this, we have a separate events server, wonders what difference this would make? if any&lt;/P&gt;</description>
    <pubDate>Fri, 31 May 2024 14:00:10 GMT</pubDate>
    <dc:creator>Kevin_Stanton</dc:creator>
    <dc:date>2024-05-31T14:00:10Z</dc:date>
    <item>
      <title>Notes on Script to Identify vulnerable Security Gateways for CVE-2024-24919</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/215815#M35729</link>
      <description>&lt;P&gt;Hey everyone,&lt;/P&gt;
&lt;P&gt;Just sharing a quick note on running the script from &lt;A href="https://support.checkpoint.com/results/sk/sk182336" target="_self"&gt;SK182336&lt;/A&gt;&amp;nbsp;to determine if any of your gateways are vulnerable. When running the script, some users have reported an error similar to: "Failed to collect Domains".&lt;/P&gt;
&lt;P&gt;If you come across this, just double-check that you have the management server object highlighted when running your script. This error is a little ambiguous, but in SMS environments it may return simply because a gateway was highlighted instead of the management.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hopefully, this little tidbit will save someone some time.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Thu, 30 May 2024 21:07:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/215815#M35729</guid>
      <dc:creator>FuzzyLogic</dc:creator>
      <dc:date>2024-05-30T21:07:34Z</dc:date>
    </item>
    <item>
      <title>Re: Notes on Script to Identify vulnerable Security Gateways for CVE-2024-24919</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/215831#M35737</link>
      <description>&lt;P&gt;100% true! I tested your theory and thats exactly it.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 01:20:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/215831#M35737</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-05-31T01:20:39Z</dc:date>
    </item>
    <item>
      <title>Re: Notes on Script to Identify vulnerable Security Gateways for CVE-2024-24919</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/215843#M35742</link>
      <description>&lt;P&gt;Thank you very much for pointing this out and sharing with the community.&lt;/P&gt;
&lt;P&gt;We will take this feedback, and try to give a clearer message if we release another version of the script.&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 06:04:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/215843#M35742</guid>
      <dc:creator>Tomer_Noy</dc:creator>
      <dc:date>2024-05-31T06:04:04Z</dc:date>
    </item>
    <item>
      <title>Re: Notes on Script to Identify vulnerable Security Gateways for CVE-2024-24919</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/215886#M35765</link>
      <description>&lt;P&gt;Hey&lt;/P&gt;&lt;P&gt;I run the script from the Script repository on a single stand alone management server R81.10 T139, Smart Console R81.10.9600.423&lt;/P&gt;&lt;P&gt;After clicking on details of the Task I get the pop up from Smart console "Requested log record was not found"&lt;/P&gt;&lt;P&gt;Get the same results with "check-for-local-users-with-password-only-authentication-v5" and "VPNcheck_v3"&lt;/P&gt;&lt;P&gt;is this good, bad or indifferent?&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 10:07:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/215886#M35765</guid>
      <dc:creator>Kevin_Stanton</dc:creator>
      <dc:date>2024-05-31T10:07:44Z</dc:date>
    </item>
    <item>
      <title>Re: Notes on Script to Identify vulnerable Security Gateways for CVE-2024-24919</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/215890#M35767</link>
      <description>&lt;P&gt;We found that the script ran succesfully, but a patched R81.00 cluster is identified as vulnerable:&lt;BR /&gt;&lt;BR /&gt;ALERT: Number of vulnerable Remote Access gateway(s) identified: 1&lt;BR /&gt;Recommendation: Install Hotfix to mitigate CVE-2024-24919 according to sk182336.&lt;/P&gt;&lt;P&gt;- cluster.name&lt;BR /&gt;&lt;BR /&gt;EDIT: We used the check-for-CVE-2024-24919-v2.zip with check-for-CVE-2024-24919.sh in it.&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 10:20:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/215890#M35767</guid>
      <dc:creator>mk2</dc:creator>
      <dc:date>2024-05-31T10:20:35Z</dc:date>
    </item>
    <item>
      <title>Re: Notes on Script to Identify vulnerable Security Gateways for CVE-2024-24919</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/215892#M35768</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Thank you for the feedback. The script automates checking whether Mobile Access blade (MAB) is activated or the gateway belongs to the Remote Access VPN community. These are the manual instructions we give to customer to check potential vulnerability.&lt;/P&gt;
&lt;P&gt;To keep things simple, we did not invoke APIs or scripts to the gateways themselves to see if the HF was installed. The outcome of the script is whether it's important to install the HF.&lt;/P&gt;
&lt;P&gt;We will check if we can improve the text to be clearer, in case we release an updated script.&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 10:40:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/215892#M35768</guid>
      <dc:creator>Tomer_Noy</dc:creator>
      <dc:date>2024-05-31T10:40:03Z</dc:date>
    </item>
    <item>
      <title>Re: Notes on Script to Identify vulnerable Security Gateways for CVE-2024-24919</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/215893#M35769</link>
      <description>&lt;P&gt;In your environment, do you see other logs?&lt;/P&gt;
&lt;P&gt;The task running the script creates a log that represents the task's status. It's possible that there is a delay in indexing in your environment, or indexing is deactivated, therefore you cannot open the task details.&lt;/P&gt;
&lt;P&gt;I suggest to try a little bit later, or run the script manually by connecting to the Management/Standalone machine's console.&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 10:42:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/215893#M35769</guid>
      <dc:creator>Tomer_Noy</dc:creator>
      <dc:date>2024-05-31T10:42:10Z</dc:date>
    </item>
    <item>
      <title>Re: Notes on Script to Identify vulnerable Security Gateways for CVE-2024-24919</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/215895#M35771</link>
      <description>&lt;P&gt;A little bit confusing, but that explains it. Thank you very much!&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 10:50:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/215895#M35771</guid>
      <dc:creator>mk2</dc:creator>
      <dc:date>2024-05-31T10:50:12Z</dc:date>
    </item>
    <item>
      <title>Re: Notes on Script to Identify vulnerable Security Gateways for CVE-2024-24919</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/215900#M35772</link>
      <description>&lt;P&gt;I am getting logs fine&lt;/P&gt;&lt;P&gt;Ran it manually from Home directory, on the management server.&lt;BR /&gt;&lt;BR /&gt;chmod u+x VPNcheck.sh&lt;/P&gt;&lt;P&gt;chmod u+x check-for-local-users-with-password-only-authentication.sh&lt;/P&gt;&lt;P&gt;./VPNcheck.sh&lt;BR /&gt;No Local accounts with Password Authentication method found. No further action required.&lt;/P&gt;&lt;P&gt;./check-for-local-users-with-password-only-authentication.sh&lt;BR /&gt;No Local accounts with Password Authentication method found. No further action required.&lt;/P&gt;&lt;P&gt;I am asumming that "No Local accounts with Password Authentication method found. No further action required." is a good thing &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 11:23:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/215900#M35772</guid>
      <dc:creator>Kevin_Stanton</dc:creator>
      <dc:date>2024-05-31T11:23:15Z</dc:date>
    </item>
    <item>
      <title>Re: Notes on Script to Identify vulnerable Security Gateways for CVE-2024-24919</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/215916#M35778</link>
      <description>&lt;P&gt;You may want to double-check to see if you have the correct script for the the vulnerability check. When I download it from the SK182336 I get a file named "check-for-CVE-2024-24919.sh" not "VPNcheck.sh". The initial scripts released only validated whether or not local users exist with password auth and VPN access, the newer CVE script is running checks to see if the vulnerability is present. (Important Note: it is possible to not have any local users present and still be vulnerable)&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 13:29:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/215916#M35778</guid>
      <dc:creator>FuzzyLogic</dc:creator>
      <dc:date>2024-05-31T13:29:48Z</dc:date>
    </item>
    <item>
      <title>Re: Notes on Script to Identify vulnerable Security Gateways for CVE-2024-24919</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/215919#M35780</link>
      <description>&lt;P&gt;Ran that one all good &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;still adding the Hot fix regardless, 5 more clusters to go, taking longer to sort out change windows.&lt;/P&gt;&lt;P&gt;Looks at Checkpoint where do I send the bill for my wifes flowers, that is our weekend wrecked.&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 13:51:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/215919#M35780</guid>
      <dc:creator>Kevin_Stanton</dc:creator>
      <dc:date>2024-05-31T13:51:02Z</dc:date>
    </item>
    <item>
      <title>Re: Notes on Script to Identify vulnerable Security Gateways for CVE-2024-24919</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/215921#M35781</link>
      <description>&lt;P&gt;I just re read this, we have a separate events server, wonders what difference this would make? if any&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 14:00:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/215921#M35781</guid>
      <dc:creator>Kevin_Stanton</dc:creator>
      <dc:date>2024-05-31T14:00:10Z</dc:date>
    </item>
    <item>
      <title>Re: Notes on Script to Identify vulnerable Security Gateways for CVE-2024-24919</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/216319#M35944</link>
      <description>&lt;P&gt;We just released an updated script that will iterate over potentially vulnerable gateways and will run commands to check for relevant HF or JHF fix installation.&lt;/P&gt;
&lt;P&gt;The updated script will no longer mark patched gateways as vulnerable.&lt;BR /&gt;Thank you for the community feedback!&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Tomer_Noy_0-1717491056712.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26061i94A61217602A7D1B/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Tomer_Noy_0-1717491056712.png" alt="Tomer_Noy_0-1717491056712.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/download/133115" target="_self"&gt;https://support.checkpoint.com/results/download/133115&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2024 08:51:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/216319#M35944</guid>
      <dc:creator>Tomer_Noy</dc:creator>
      <dc:date>2024-06-04T08:51:43Z</dc:date>
    </item>
    <item>
      <title>Re: Notes on Script to Identify vulnerable Security Gateways for CVE-2024-24919</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/216343#M35952</link>
      <description>&lt;P&gt;Awesome, will test in later and report back.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2024 11:22:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/216343#M35952</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-06-04T11:22:10Z</dc:date>
    </item>
    <item>
      <title>Re: Notes on Script to Identify vulnerable Security Gateways for CVE-2024-24919</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/216372#M35964</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/9372"&gt;@Tomer_Noy&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Not sure if this is expected (I assume not), but here is what I experienced. Before upgrade of my cluster, it was on R81.20 jumbo 53 and I upgraded to jumbo 65, but I get below when running script from the mgmt for the cve check. I attached 2 screenshots, first worked fine BEFORE the upgrade and 2nd I get the error seen.&lt;/P&gt;
&lt;P&gt;Thoughts?&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_1.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26079iDA8DA521552F019E/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot_1.png" alt="Screenshot_1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_2.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26080i3ABB712DC13A0E7F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot_2.png" alt="Screenshot_2.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2024 13:30:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/216372#M35964</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-06-04T13:30:45Z</dc:date>
    </item>
    <item>
      <title>Re: Notes on Script to Identify vulnerable Security Gateways for CVE-2024-24919</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/216376#M35967</link>
      <description>&lt;P&gt;Is this a multi-domain environment, or Security Management Server?&lt;/P&gt;
&lt;P&gt;On what did you install JHF 65? On the gateway or management server?&lt;/P&gt;
&lt;P&gt;The error message seems to indicate a problem in fetching data on the management, so upgrading the gateway/cluster should not have done this.&lt;/P&gt;
&lt;P&gt;Can you try again?&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2024 13:45:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/216376#M35967</guid>
      <dc:creator>Tomer_Noy</dc:creator>
      <dc:date>2024-06-04T13:45:23Z</dc:date>
    </item>
    <item>
      <title>Re: Notes on Script to Identify vulnerable Security Gateways for CVE-2024-24919</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/216379#M35968</link>
      <description>&lt;P&gt;Just regular SMS&lt;/P&gt;
&lt;P&gt;I even rebooted the mgmt, same issue. Let me install jumbo 65 on the mgmt server, not sure if that will make a difference, but will let you know.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2024 13:50:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/216379#M35968</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-06-04T13:50:36Z</dc:date>
    </item>
    <item>
      <title>Re: Notes on Script to Identify vulnerable Security Gateways for CVE-2024-24919</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/216382#M35969</link>
      <description>&lt;P&gt;No joy &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;I upgraded mgmt to take 65, rebooted, even deleted and re-added the script, exact same problem, except now it shows same for both gateways, not just the backup.&lt;/P&gt;
&lt;P&gt;Super odd...&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2024 14:07:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/216382#M35969</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-06-04T14:07:57Z</dc:date>
    </item>
    <item>
      <title>Re: Notes on Script to Identify vulnerable Security Gateways for CVE-2024-24919</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/216385#M35971</link>
      <description>&lt;P&gt;Anyway&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/9372"&gt;@Tomer_Noy&lt;/a&gt;&amp;nbsp;, honestly, not a biggie, as they say, I copied the script to the mgmt via winscp and showed correct output. I want to THANK you and everyone else,&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/103381"&gt;@FuzzyLogic&lt;/a&gt;&amp;nbsp;,&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;,&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/181"&gt;@_Val_&lt;/a&gt;&amp;nbsp;, and all the other people (hard to remember everyone now) who worked very hard on this. I know what Val meant when he said recently people are working around the clock for this issue and its most likely true. Super important to be on top of things like this, so I can say we appreciate, and Im sure I speak for others as well.&lt;/P&gt;
&lt;P&gt;Best regards mate.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Output from the lab mgmt:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;[Expert@CP-management:0]# cd /var/log/scripts/&lt;BR /&gt;[Expert@CP-management:0]# chmod 777 *&lt;BR /&gt;[Expert@CP-management:0]# ./check-for-CVE-2024-24919.sh&lt;BR /&gt;All gateways are not vulnerable to CVE-2024-24919. No further action required.&lt;BR /&gt;[Expert@CP-management:0]#&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2024 14:16:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/216385#M35971</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-06-04T14:16:13Z</dc:date>
    </item>
    <item>
      <title>Re: Notes on Script to Identify vulnerable Security Gateways for CVE-2024-24919</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/216390#M35973</link>
      <description>&lt;P&gt;Just to update quick,&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/37502"&gt;@Omer_Kleinstern&lt;/a&gt;&amp;nbsp;reached out to me directly about the script, I ended up rebooting the mgmt again, ran it all good. Thanks so much guys, I truly value and am grateful for how quickly you responded and are on top of this&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt;&lt;span class="lia-unicode-emoji" title=":victory_hand:"&gt;✌️&lt;/span&gt;&lt;span class="lia-unicode-emoji" title=":ok_hand:"&gt;👌&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_1.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26085i43309A63E335758D/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot_1.png" alt="Screenshot_1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2024 14:30:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Notes-on-Script-to-Identify-vulnerable-Security-Gateways-for-CVE/m-p/216390#M35973</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-06-04T14:30:29Z</dc:date>
    </item>
  </channel>
</rss>

