<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Important security update - stay protected against VPN Information Disclosure (CVE-2024-24919) in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/216762#M36086</link>
    <description>&lt;P&gt;What versions? Can you send output of random gateway with installed hotfix?&lt;/P&gt;
&lt;P&gt;cpinfo -y all&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
    <pubDate>Thu, 06 Jun 2024 17:43:06 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2024-06-06T17:43:06Z</dc:date>
    <item>
      <title>Important security update - stay protected against VPN Information Disclosure (CVE-2024-24919)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215310#M35533</link>
      <description>&lt;H3&gt;Update June 5, 2024&lt;/H3&gt;
&lt;P&gt;We now have fixes for CVE-2024-24919 for releases dating back to R77.30 with latest JHF.&lt;/P&gt;
&lt;H3&gt;Update June 4, 2024&lt;/H3&gt;
&lt;P&gt;&lt;SPAN&gt;The procedure to identify vulnerable Security Gateways in &lt;/SPAN&gt;&lt;A class="fui-Link ___1rxvrpe f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1hu3pq6 f11qmguv f19f4twv f1tyq0we f1g0x7ka fhxju0i f1qch9an f1cnd47f fqv5qza f1vmzxwi f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://support.checkpoint.com/results/sk/sk182336" href="https://support.checkpoint.com/results/sk/sk182336" target="_blank" rel="noreferrer noopener" aria-label="Link sk182336 - Hotfix for CVE-2024-24919"&gt;sk182336 - Hotfix for CVE-2024-24919&lt;/A&gt;&lt;SPAN&gt; was updated.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The Gateways script was replaced with v3. The updated script &lt;U&gt;checks if the Hotfix is installed&lt;/U&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;H3&gt;Update June 03, 2024&lt;/H3&gt;
&lt;H4&gt;&lt;SPAN&gt;Automatic interim preventative measure deployed through AutoUpdater utility&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;Security Gateways that were configured to the Check Point's Auto Update process are gradually receiving an update (as of June 2, 2024), which helps protect them from various attempts to exploit the CVE. This is an interim preventative measure until the Hotfix is fully installed on customers’ Security Gateways. &lt;STRONG&gt;It is important to emphasize that installing the Hotfix in &lt;A href="https://support.checkpoint.com/results/sk/sk182336" target="_blank" rel="noopener"&gt;sk182336&lt;/A&gt; is the best way to stay protected from this vulnerability.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;This is relevant for gateways running R80.40 and above. Instructions to confirm this is enabled are in &lt;A href="https://support.checkpoint.com/results/sk/sk182336" target="_self"&gt;&lt;STRONG&gt;sk182336&lt;/STRONG&gt;&lt;/A&gt;.&lt;/P&gt;
&lt;H3&gt;Update June 01, 2024&lt;/H3&gt;
&lt;H4&gt;Quantum Spark&lt;/H4&gt;
&lt;P&gt;We now have a specific SK related to CVE-2024-24919 for Quantum Spark appliances! : &lt;A href="https://support.checkpoint.com/results/sk/sk182357" target="_self"&gt;sk182357&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;In addition to providing links to updated firmware, this SK lists the specific remediation steps that may be necessary on Quantum Spark Appliances, which includes:&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Disable the Remote Access VPN blade&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Change the Administrator passwords and use complex passwords&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Restrict access through "Reach My Device"&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Enable Two-Factor Authentication for Administrators (R81.10.10 and higher)&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Enable Two-Factor Authentication for Remote Access VPN users (R81.10.10 and higher)&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Enable notifications for administrator access&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;H4&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4&gt;cccd&lt;/H4&gt;
&lt;P&gt;In R81.10 we added a feature to improve VPN performance - named CCCD&lt;/P&gt;
&lt;P&gt;This feature is &lt;STRONG&gt;disabled by default&lt;/STRONG&gt;, and we know about few advanced customers who are using it.&lt;/P&gt;
&lt;P&gt;Customers who enable CCCD &lt;SPAN&gt;&lt;STRONG&gt;are still vulnerable to CVE-2024-24919 even after installing the Hotfix!&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;YOU MUST DISABLE CCCD TO BECOME PROTECTED!&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;Instructions below and also on&amp;nbsp;&lt;A class="fui-Link ___1rxvrpe f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1hu3pq6 f11qmguv f19f4twv f1tyq0we f1g0x7ka fhxju0i f1qch9an f1cnd47f fqv5qza f1vmzxwi f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://support.checkpoint.com/results/sk/sk182336" href="https://support.checkpoint.com/results/sk/sk182336" target="_blank" rel="noreferrer noopener" aria-label="Link SK182336"&gt;SK182336&lt;/A&gt;:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Run the command:&amp;nbsp;&lt;CODE&gt;&lt;STRONG&gt;vpn cccd status&lt;/STRONG&gt;&lt;/CODE&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;The expected output is:&amp;nbsp;&lt;CODE&gt;&lt;STRONG&gt;vpn: 'cccd' is disabled&lt;/STRONG&gt;&lt;/CODE&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If the output differs, stop the&amp;nbsp;&lt;CODE&gt;&lt;STRONG&gt;CCCD&lt;/STRONG&gt;&lt;/CODE&gt;&amp;nbsp;process by running the&amp;nbsp;&lt;CODE&gt;&lt;STRONG&gt;vpn cccd disable&lt;/STRONG&gt;&lt;/CODE&gt;&amp;nbsp;command.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;H3&gt;Updated May 31, 2024&lt;/H3&gt;
&lt;P&gt;&lt;SPAN&gt;To streamline information flow and simplify actions for our customers and partners, we have consolidated all relevant details about CVE-2024-24919 and its remediation into a single SecureKnowledge article: &lt;A href="https://support.checkpoint.com/results/sk/sk182336" target="_self"&gt;sk182336&lt;/A&gt;. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please revisit it now, as we have added some updates.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Updated May 30, 2024&lt;/H3&gt;
&lt;P style="font-weight: 400;"&gt;To remain protected from CVE-2024-24919, it is mandatory install this on Check Point Quantum and Spark gateways following&amp;nbsp;&lt;STRONG&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk182336" target="_blank" rel="noopener"&gt;fix&lt;/A&gt;&lt;/STRONG&gt;&lt;STRONG&gt;.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P style="font-weight: 400;"&gt;In addition, you should take the following extra security measures, which are documented in &lt;A href="https://support.checkpoint.com/results/sk/sk182336" target="_self"&gt;sk182336&lt;/A&gt;:&lt;/P&gt;
&lt;DIV class="checkpoint_navigate"&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Change the password of the LDAP Account Unit&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Reset password of local accounts connecting to Remote Access VPN with password-only authentication&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Prevent Local Accounts from connecting to VPN with Password-Only Authentication&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Renew the server certificates for the Inbound HTTPS Inspection on the Security Gateway&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Renew the certificate for the Outbound HTTPS Inspection on the Security Gateway&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Reset Gaia OS passwords for all local users&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Regenerate the SSH local user certificate on the Security Gateway (see &lt;A href="https://support.checkpoint.com/results/sk/sk182336" target="_self"&gt;the SK&lt;/A&gt; for more details)&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Renew the certificate for the SSH Inspection&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;/DIV&gt;
&lt;H3&gt;Update May 28, 2024&lt;/H3&gt;
&lt;P style="font-weight: 400;"&gt;Yesterday (May 27th) we delivered a solution that addresses attacks we saw on a small number of customers’ VPN remote access networks.&lt;/P&gt;
&lt;P style="font-weight: 400;"&gt;Today we found the root cause for these attacks and are now releasing a fix. To remain protected, it is mandatory install this on Check Point Quantum and Spark gateways following&amp;nbsp;&lt;STRONG&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk182336" target="_blank" rel="noopener"&gt;fix&lt;/A&gt;&lt;/STRONG&gt;&lt;STRONG&gt;.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P style="font-weight: 400;"&gt;The vulnerability we found (CVE-2024-24919) affects Security Gateways with remote access VPN or mobile access blade enabled. It is potentially allowing an attacker to read certain information on Gateways once connected to the internet and enabled with remote access VPN or mobile access.&lt;/P&gt;
&lt;P style="font-weight: 400;"&gt;The fix we developed prevents the use of this vulnerability, once deployed on the relevant Gateways. Install this now to stay protected.&lt;/P&gt;
&lt;P style="font-weight: 400;"&gt;The attempts we’ve seen so far, inline with what we alerted you yesterday, are focusing on remote access on old local accounts with unrecommended password-only authentication within the known small customers we referred to yesterday. Check Point’s network is not affected by this.&lt;/P&gt;
&lt;P style="font-weight: 400;"&gt;More information on today’s notification can be found &lt;A href="https://blog.checkpoint.com/security/enhance-your-vpn-security-posture/" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P style="font-weight: 400;"&gt;Customer security is our top priority. We will continue to investigate this issue and provide additional updates.&lt;/P&gt;
&lt;P style="font-weight: 400;"&gt;For additional information, please contact Check Point Support Center or your Check Point representative.&lt;/P&gt;
&lt;P style="font-weight: 400;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3 style="font-weight: 400;"&gt;Originally posted on May 27, 2024.&lt;/H3&gt;
&lt;P&gt;Over the past few months, we have observed increased interest of malicious groups in leveraging remote-access VPN environments as an entry point and attack vector into enterprises.&lt;/P&gt;
&lt;P&gt;Attackers are motivated to gain access to organizations over remote-access setups so they can try to discover relevant enterprise assets and users, seeking for vulnerabilities in order to gain persistence on key enterprise assets.&lt;/P&gt;
&lt;P&gt;We have recently witnessed compromised VPN solutions, including various cyber security vendors. In light of these events, we have been monitoring attempts to gain unauthorized access to VPNs of Check Point’s customers.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;By May 24, 2024 we identified a small number of login attempts using old VPN local-accounts relying on unrecommended password-only authentication method.&lt;/P&gt;
&lt;P&gt;We have assembled special teams of Incident Response, Research, Technical Services and Products professionals which thoroughly explored those and any other potential related attempts. Relying on these customers notifications and Check Point’s analysis, the teams found within 24 hours a few potential customers which were subject to similar attempts.&lt;/P&gt;
&lt;P&gt;Password-only authentication is considered an unfavourable method to ensure the highest levels of security, and we recommend not to rely on this when logging-in to network infrastructure.&lt;/P&gt;
&lt;P&gt;Check Point has&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk182336" target="_blank" rel="noopener noreferrer"&gt;released a solution&lt;/A&gt;, as a preventative measure to address these unauthorised remote access attempts.&lt;/P&gt;
&lt;P&gt;We encourage our customers to enhance their VPN security posture by:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Check if you have local accounts, if they were used and by whom.&lt;/LI&gt;
&lt;LI&gt;If you don’t use them – best to disable them.&lt;/LI&gt;
&lt;LI&gt;If you have local accounts which you want to use and are password-only authenticated, add another layer of authentication (like certificates) to increase your environments IT security.&lt;/LI&gt;
&lt;LI&gt;As said, If you are a Check Point customer, deploy our solution on your Security Gateways. This will automatically prevent unauthorized access to your VPNs by local accounts with password-only authentication method.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk182336" target="_blank" rel="noopener noreferrer"&gt;Learn more&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and receive practical guidance for configuration monitoring and practices to enhance your VPN security posture.&lt;/P&gt;
&lt;P&gt;For any additional assistance required, please contact Check Point technical support Center or your local Check Point representative.&lt;/P&gt;
&lt;P&gt;We value the collaboration of our customers and dedication of our teams to reach a solution which effectively addresses any such attempts.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Jun 2024 00:33:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215310#M35533</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2024-06-06T00:33:40Z</dc:date>
    </item>
    <item>
      <title>Re: Important Announcement - Enhance your VPN Security Posture!</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215328#M35539</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I am getting the following error message when running the script:&lt;/SPAN&gt;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;Traceback (most recent call last):
  File "/var/tmp/VPNcheck.py", line 187, in &amp;lt;module&amp;gt;
    helper.get_relevant_objs(domain_name)
  File "/var/tmp/VPNcheck.py", line 176, in get_relevant_objs
    self.dereference_user_group_recursively(user_group)
  File "/var/tmp/VPNcheck.py", line 136, in dereference_user_group_recursively
    for member in show_res["members"]:
KeyError: 'members'&lt;/LI-CODE&gt;</description>
      <pubDate>Mon, 27 May 2024 20:04:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215328#M35539</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2024-05-27T20:04:33Z</dc:date>
    </item>
    <item>
      <title>Re: Important Announcement - Enhance your VPN Security Posture!</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215329#M35540</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;SPAN&gt;Moudar for sharing. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;We'll look into it ASAP and update the script with a fix if needed, we may approach you offline with few questions. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks again for your help, &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Eran&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 27 May 2024 20:12:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215329#M35540</guid>
      <dc:creator>Eran_Habad</dc:creator>
      <dc:date>2024-05-27T20:12:40Z</dc:date>
    </item>
    <item>
      <title>Re: Important Announcement - Enhance your VPN Security Posture!</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215333#M35541</link>
      <description>&lt;P&gt;I read on Google it was only 3 customers, but regardless, better be proactive, than reactive, plus MFA is something literally everyone is implementing nowdays.&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 28 May 2024 01:35:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215333#M35541</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-05-28T01:35:44Z</dc:date>
    </item>
    <item>
      <title>Re: Important Announcement - Enhance your VPN Security Posture!</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215335#M35542</link>
      <description>&lt;P&gt;I get the same error message when running the script.&lt;/P&gt;</description>
      <pubDate>Tue, 28 May 2024 04:47:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215335#M35542</guid>
      <dc:creator>Josef_Maier</dc:creator>
      <dc:date>2024-05-28T04:47:28Z</dc:date>
    </item>
    <item>
      <title>Re: Important Announcement - Enhance your VPN Security Posture!</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215337#M35543</link>
      <description>&lt;P&gt;Thank you Josef. We'll approach you offline to analyze.&lt;/P&gt;
&lt;P&gt;Eran&lt;/P&gt;</description>
      <pubDate>Tue, 28 May 2024 05:13:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215337#M35543</guid>
      <dc:creator>Eran_Habad</dc:creator>
      <dc:date>2024-05-28T05:13:01Z</dc:date>
    </item>
    <item>
      <title>Re: Important Announcement - Enhance your VPN Security Posture!</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215360#M35545</link>
      <description>&lt;P&gt;same issue in at least 3 managers of our customers&lt;/P&gt;</description>
      <pubDate>Tue, 28 May 2024 10:15:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215360#M35545</guid>
      <dc:creator>Machine_Head</dc:creator>
      <dc:date>2024-05-28T10:15:06Z</dc:date>
    </item>
    <item>
      <title>Re: Important Announcement - Enhance your VPN Security Posture!</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215362#M35546</link>
      <description>&lt;P&gt;Hi, we updated the script with a fix. Please try again and let know if it worked.&lt;/P&gt;
&lt;P&gt;Sharing again the link to the file:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/download/132862" target="_blank"&gt;Check Point validate remote access script&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Thanks, Eran&lt;/P&gt;</description>
      <pubDate>Tue, 28 May 2024 10:36:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215362#M35546</guid>
      <dc:creator>Eran_Habad</dc:creator>
      <dc:date>2024-05-28T10:36:29Z</dc:date>
    </item>
    <item>
      <title>Re: Important Announcement - Enhance your VPN Security Posture!</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215363#M35547</link>
      <description>&lt;P&gt;Hi, we updated the script with a fix. Please try again and let me know if it worked.&lt;/P&gt;
&lt;P&gt;Sharing again the link to the file:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/download/132862" target="_blank" rel="noopener noreferrer"&gt;Check Point validate remote access script&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Thanks, Eran&lt;/P&gt;</description>
      <pubDate>Tue, 28 May 2024 10:47:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215363#M35547</guid>
      <dc:creator>Eran_Habad</dc:creator>
      <dc:date>2024-05-28T10:47:04Z</dc:date>
    </item>
    <item>
      <title>Re: Important Announcement - Enhance your VPN Security Posture!</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215365#M35548</link>
      <description>&lt;P&gt;Hi Eran,&lt;BR /&gt;&lt;BR /&gt;Thanks for the quick turn around and the hard work.&lt;BR /&gt;&lt;BR /&gt;Script seems to have worked and failed at the same time:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;DIV class=""&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25891iE521DBFD92470C0F/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 May 2024 10:46:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215365#M35548</guid>
      <dc:creator>Machine_Head</dc:creator>
      <dc:date>2024-05-28T10:46:12Z</dc:date>
    </item>
    <item>
      <title>Re: Important Announcement - Enhance your VPN Security Posture!</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215368#M35549</link>
      <description>&lt;P&gt;&lt;SPAN&gt;It's working now.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 28 May 2024 11:33:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215368#M35549</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2024-05-28T11:33:43Z</dc:date>
    </item>
    <item>
      <title>Re: Important Announcement - Enhance your VPN Security Posture!</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215373#M35550</link>
      <description>&lt;P&gt;Hey Eran,&lt;/P&gt;
&lt;P&gt;Question. Say someone installs this on top of jumbo 53, would jumbo 54 later install okay or would there be a conflict?&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 28 May 2024 11:58:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215373#M35550</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-05-28T11:58:47Z</dc:date>
    </item>
    <item>
      <title>Re: Important Announcement - Enhance your VPN Security Posture!</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215383#M35552</link>
      <description>&lt;P&gt;Issue is resolved thanks to your help. Thank you &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Eran&lt;/P&gt;</description>
      <pubDate>Tue, 28 May 2024 14:23:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215383#M35552</guid>
      <dc:creator>Eran_Habad</dc:creator>
      <dc:date>2024-05-28T14:23:32Z</dc:date>
    </item>
    <item>
      <title>Re: Important security update - stay protected against VPN Information Disclosure (CVE-2024-24919)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215425#M35554</link>
      <description>&lt;P&gt;This CVE seems like a coincidence with a recent CVE of another vendor that was also related to a vul in the vpn web portal that allowed a rce, even without the user authenticating. At least on CP it seems that this exploit is only possible after successful authentication, let’s hope we don’t receive any more surprises related to this cve.&lt;/P&gt;&lt;P&gt;Previously &amp;gt; R81 the password of local user only supported 8 characters, this changed in &amp;gt; R81, is it possible that some fws have users with weak password and are exposed to brute force attacks? Was this the vulnerability detected? I’m curious to know what’s the real vulnerability that’s being exploited here, let’s hope that there aren’t any rce related to the multiportal.&lt;/P&gt;</description>
      <pubDate>Tue, 28 May 2024 23:10:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215425#M35554</guid>
      <dc:creator>leonarit</dc:creator>
      <dc:date>2024-05-28T23:10:26Z</dc:date>
    </item>
    <item>
      <title>Re: Important security update - stay protected against VPN Information Disclosure (CVE-2024-24919)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215426#M35555</link>
      <description>&lt;P&gt;The FAQ explains the situation in a little more detail: &lt;A href="https://support.checkpoint.com/results/sk/sk182337" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk182337&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 May 2024 23:37:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215426#M35555</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-05-28T23:37:00Z</dc:date>
    </item>
    <item>
      <title>Re: Important Announcement - Enhance your VPN Security Posture!</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215427#M35795</link>
      <description>&lt;P&gt;Please note a Fix is available in the following branches.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;R81.10.10&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk181080" aria-label="Link https://support.checkpoint.com/results/sk/sk181080" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk181080&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;R81.10.08&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk181079" aria-label="Link https://support.checkpoint.com/results/sk/sk181079" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk181079&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;R80.20.60&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk179922" aria-label="Link https://support.checkpoint.com/results/sk/sk179922" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk179922&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;R77.20.87&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk151574" aria-label="Link https://support.checkpoint.com/results/sk/sk151574" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk151574&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;R77.20.81&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;U&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk137212" aria-label="Link https://support.checkpoint.com/results/sk/sk137212" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk13721&lt;/A&gt;2&lt;/U&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Tue, 28 May 2024 23:43:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215427#M35795</guid>
      <dc:creator>Amir_Ayalon</dc:creator>
      <dc:date>2024-05-28T23:43:11Z</dc:date>
    </item>
    <item>
      <title>Re: Important security update - stay protected against VPN Information Disclosure (CVE-2024-24919)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215428#M35557</link>
      <description>&lt;P&gt;Thanks, I had already checked that sk and I'm assuming that when CP says vulnerability, it really means possible exploit due to "weak configuration", and seeing what happened in the previous days CP decided to alert to that “weak configuration”.&lt;/P&gt;&lt;P&gt;This current “weak configuration” is something that was always possible, so something had to change to CP decide to announce this cve, let’s hope it was just something related the behavior observed in the previous days.&lt;/P&gt;</description>
      <pubDate>Tue, 28 May 2024 23:52:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215428#M35557</guid>
      <dc:creator>leonarit</dc:creator>
      <dc:date>2024-05-28T23:52:40Z</dc:date>
    </item>
    <item>
      <title>Re: Important security update - stay protected against VPN Information Disclosure (CVE-2024-24919)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215436#M35559</link>
      <description>&lt;P&gt;So even if the script says that there are no local accounts with pw only the fix must/should be installed or not?&lt;/P&gt;</description>
      <pubDate>Wed, 29 May 2024 06:05:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215436#M35559</guid>
      <dc:creator>dede79</dc:creator>
      <dc:date>2024-05-29T06:05:10Z</dc:date>
    </item>
    <item>
      <title>Re: Important Announcement - Enhance your VPN Security Posture!</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215437#M35796</link>
      <description>&lt;P&gt;Hi Amir. Can you confirm 996002908&amp;nbsp;&lt;SPAN&gt;is the latest build with the fix announced last night for 1600 appliances?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 29 May 2024 06:36:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215437#M35796</guid>
      <dc:creator>BorisL</dc:creator>
      <dc:date>2024-05-29T06:36:06Z</dc:date>
    </item>
    <item>
      <title>Re: Important security update - stay protected against VPN Information Disclosure (CVE-2024-24919)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215438#M35561</link>
      <description>&lt;P&gt;We recommend installing the fix in any case. It is a best practice to patch announced CVEs.&lt;/P&gt;</description>
      <pubDate>Wed, 29 May 2024 06:40:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215438#M35561</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2024-05-29T06:40:08Z</dc:date>
    </item>
  </channel>
</rss>

