<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ONELINER - Password Bulk Operation (CVE-2024-24919) in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/ONELINER-Password-Bulk-Operation-CVE-2024-24919/m-p/216692#M36069</link>
    <description>&lt;P&gt;thanks for the script just tested the 3rd one, but it only works for the first 50 users...to make it work for 500 you have to add:&lt;/P&gt;&lt;PRE&gt;mgmt_cli -r true show users details-level "full" &lt;STRONG&gt;limit 500 offset 0&lt;/STRONG&gt;&lt;/PRE&gt;&lt;P&gt;and for the next 500 users:&lt;/P&gt;&lt;PRE&gt;mgmt_cli -r true show users details-level "full" &lt;STRONG&gt;limit 500 offset 500&lt;/STRONG&gt;&lt;/PRE&gt;&lt;P&gt;hope this helps...&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 06 Jun 2024 11:19:37 GMT</pubDate>
    <dc:creator>GHaider</dc:creator>
    <dc:date>2024-06-06T11:19:37Z</dc:date>
    <item>
      <title>ONELINER - Password Bulk Operation (CVE-2024-24919)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/ONELINER-Password-Bulk-Operation-CVE-2024-24919/m-p/216337#M35949</link>
      <description>&lt;P&gt;These three oneliners allow you to reset the passwords of all users in the SmartConsole or to restrict access of all users.&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;Important!&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If you run this onliner on the Smart Center Server, all users settings will be changed accordingly.&lt;BR /&gt;You should therefore back up the management server first. More read here:&lt;BR /&gt;- &lt;A href="https://support.checkpoint.com/results/sk/sk108902" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;sk108902: Best Practices - Backup on Gaia OS&lt;/SPAN&gt;&lt;/A&gt; (I would recommend a snapshot or a migrate server export of the SMS.)&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;TABLE style="background-color: #cccccc; width: 100%;" border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="100%"&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set all users to ‘undefined’&lt;BR /&gt;&lt;BR /&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;BR /&gt;This onliner sets &lt;STRONG&gt;&lt;U&gt;all users&lt;/U&gt;&lt;/STRONG&gt; defined in the SmartConsole under ‘User’ to ‘undefined’ as bulk operation. &lt;BR /&gt;This means that users can no longer log in using their username and password.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="undef_bulk_54354345.jpg" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26063i5B07E047C40096D7/image-size/large?v=v2&amp;amp;px=999" role="button" title="undef_bulk_54354345.jpg" alt="undef_bulk_54354345.jpg" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;1) Execute this oneliner on SMS&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;clear; echo -e "CVE-2024-24919 password bulk operation by Heiko Ankenbrand 2024\n\n";mgmt_cli -r true show users details-level "full" limit 500 offset 0 | grep name | grep -v SMC | awk '{split($0,a," "); print a[2]}' |sed 's/\"//g' |sed 's/\n//' | tr -d '\r'  |awk '$test=$0;{system("echo -n $test")}' &amp;gt;user.txt ; for i in $(cat user.txt); do   test1=" ende"; test="mgmt_cli -r true set user name \""${i}"\" authentication-method \"undefined\""; echo -e "\n\n${test}";$test; done;&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2) Install the policy in the SmartConsole after you have run this onliner&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;TABLE style="background-color: #cccccc; width: 100%;" border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="100%"&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set all user to the same password&lt;BR /&gt;&lt;BR /&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;BR /&gt;This onliner sets &lt;STRONG&gt;&lt;U&gt;all users&lt;/U&gt;&lt;/STRONG&gt; defined in the SmartConsole under ‘User’ to default password as bulk operation. &lt;BR /&gt;This means that all users then have the password they have set.&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="undef_bulk_2_432423423.jpg" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26064iAC7913AB195DD529/image-size/large?v=v2&amp;amp;px=999" role="button" title="undef_bulk_2_432423423.jpg" alt="undef_bulk_2_432423423.jpg" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;1) Execute this oneliner on SMS&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;clear; echo -e "CVE-2024-24919 password bulk operation by Heiko Ankenbrand 2024\n\n";read -p "Default password for all user (max. 8 characters): " pass;mgmt_cli -r true show users details-level "full" limit 500 offset 0 | grep name | grep -v SMC | awk '{split($0,a," "); print a[2]}' |sed 's/\"//g' |sed 's/\n//' | tr -d '\r'  |awk '$test=$0;{system("echo -n $test")}' &amp;gt;user.txt ; for i in $(cat user.txt); do   test1=" ende"; test="'mgmt_cli -r true set user name \""${i}"\" authentication-method \"check point password\" password \""${pass}"\"'"; test=${test//\'}; echo -e "\n\n${test}"; echo $test |awk '{system($0)}'; done;&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2) Install the policy in the SmartConsole after you have run this onliner&lt;/P&gt;
&lt;TABLE style="background-color: #cccccc; width: 100%;" border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="100%"&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set all users to random passwords&lt;BR /&gt;&lt;BR /&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This onliner sets &lt;STRONG&gt;&lt;U&gt;all users&lt;/U&gt;&lt;/STRONG&gt; defined in the SmartConsole under ‘User’ to random password as bulk operation. &lt;BR /&gt;This means that all users are set to a ‘random’ password. An overview of the set passwords is shown in the file pass.txt.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="undef_bulk_3_43765356.jpg" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26068i3557A4799800BC33/image-size/large?v=v2&amp;amp;px=999" role="button" title="undef_bulk_3_43765356.jpg" alt="undef_bulk_3_43765356.jpg" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;1) Execute this oneliner on SMS&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;clear; echo "" &amp;gt; pass.txt; echo -e "CVE-2024-24919 password bulk operation by Heiko Ankenbrand 2024\n\n";mgmt_cli -r true show users details-level "full" limit 500 offset 0| grep name | grep -v SMC | awk '{split($0,a," "); print a[2]}' |sed 's/\"//g' |sed 's/\n//' | tr -d '\r'  |awk '$test=$0;{system("echo -n $test")}' &amp;gt;user.txt ; for i in $(cat user.txt); do pass=$(tr -dc A-Za-z0-9 &amp;lt;/dev/urandom | head -c 8;); test="'mgmt_cli -r true set user name \""${i}"\" authentication-method \"check point password\" password \""${pass}"\"'"; test=${test//\'}; echo -e "\n\n${test}"; echo $test |awk '{system($0)}'; echo "${i} ${pass}" &amp;gt;&amp;gt; pass.txt;  done; echo -e "\n\nYou can find the users with the randomly set passwords in the following file: pass.txt \n\nUser   Password\n-------------------------------"; more pass.txt;&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2) Install the policy in the SmartConsole after you have run this onliner&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 08 Jun 2024 16:23:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/ONELINER-Password-Bulk-Operation-CVE-2024-24919/m-p/216337#M35949</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2024-06-08T16:23:50Z</dc:date>
    </item>
    <item>
      <title>Re: ONELINER - Password Bulk Operation (CVE-2024-24919)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/ONELINER-Password-Bulk-Operation-CVE-2024-24919/m-p/216431#M35985</link>
      <description>&lt;P&gt;Very helpful oneliner to change passwords quickly and easily.&lt;BR /&gt;Thanks &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21670"&gt;@HeikoAnkenbrand&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2024 19:29:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/ONELINER-Password-Bulk-Operation-CVE-2024-24919/m-p/216431#M35985</guid>
      <dc:creator>GHOST</dc:creator>
      <dc:date>2024-06-04T19:29:10Z</dc:date>
    </item>
    <item>
      <title>Re: ONELINER - Password Bulk Operation (CVE-2024-24919)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/ONELINER-Password-Bulk-Operation-CVE-2024-24919/m-p/216692#M36069</link>
      <description>&lt;P&gt;thanks for the script just tested the 3rd one, but it only works for the first 50 users...to make it work for 500 you have to add:&lt;/P&gt;&lt;PRE&gt;mgmt_cli -r true show users details-level "full" &lt;STRONG&gt;limit 500 offset 0&lt;/STRONG&gt;&lt;/PRE&gt;&lt;P&gt;and for the next 500 users:&lt;/P&gt;&lt;PRE&gt;mgmt_cli -r true show users details-level "full" &lt;STRONG&gt;limit 500 offset 500&lt;/STRONG&gt;&lt;/PRE&gt;&lt;P&gt;hope this helps...&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Jun 2024 11:19:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/ONELINER-Password-Bulk-Operation-CVE-2024-24919/m-p/216692#M36069</guid>
      <dc:creator>GHaider</dc:creator>
      <dc:date>2024-06-06T11:19:37Z</dc:date>
    </item>
    <item>
      <title>Re: ONELINER - Password Bulk Operation (CVE-2024-24919)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/ONELINER-Password-Bulk-Operation-CVE-2024-24919/m-p/216928#M36124</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/8516"&gt;@GHaider&lt;/a&gt;&amp;nbsp;Thanks for this tip. I have added the following to the oneliner ‘limit 500 offset 0’.&lt;/P&gt;</description>
      <pubDate>Sat, 08 Jun 2024 16:26:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/ONELINER-Password-Bulk-Operation-CVE-2024-24919/m-p/216928#M36124</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2024-06-08T16:26:42Z</dc:date>
    </item>
  </channel>
</rss>

