- Products
- Learn
- Local User Groups
- Partners
- More
The State of Ransomware Q1 2026
Key Trends and Their Impact
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Step Into the Future of
AI-Powered Cyber Security
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
Hi.
Any guidence from Check Point regarding CVE-2026-31431 ?
https://access.redhat.com/security/cve/cve-2026-31431#cve-details-description
The official response is ready and available in sk184928
Quoting from there:
Practical risk: Low.
The vulnerability requires non-root local code execution, which the Gaia OS standard role model does not expose, because administrative access goes through Expert mode (already root), and non-admin roles are restricted to Clish.
At the moment, there is no information about Check Point's vulnerability for the reported CVE ... ...https://support.checkpoint.com/security-advisories.
If I look on a R81.20 installation the affected module is not present; so at a first sight, this vulnerability doesn't affect Check Point product.
We wati for someone in Check Point to provide a better answer.
We are currently working on the official response. AFAIK, R81.20 and below are not affected.
If you need an immediate response relevant to your versions in use, please open a ticket with TAC.
R81.20 and earlier are definitely not impacted by CVE-2026-31431. The problem was introduced in Linux 4.14. R81.20 uses kernel 3.10.0-1160.
R82 is the first release to use a kernel version ≥4.14.
Quick check on a R82 test box: It seems to work there.
R82+ versions are affected. However, to execute the exploit, a user has to have access to the expert shell, meaning that the user is already privileged, which defeats the purpose. Non-privileged users either cannot access FW at all or don't have the expert shell. Users at the root level don't need to elevate their permissions; they already have the maximum permissions.
Yes, unless they find a way like 2 years ago...
Even then, the exploit at the time was already able to run as root with full access. However, a blended attack is always a risk.
Maybe yes, but in any case the risk is not so high/critical because at the moment the exposure can be mitigated by filter IP addresses that can access the affected gateways.
So from my point of view, it would be enough to wait the next JHF that probably could solve it.
The issue is present in R82 and up, but there are plenty of other local privilege escalation vectors. This one is no worse than CVE-2021-3156 (sk171751), for example. R82.10 still ships sudo 1.8.19p2.
If you need something now, Red Hat's mitigation works on all versions which have the problem, including non-Red-Hat distributions. Just keep in mind it doesn't affect any of the other local privilege escalation bugs.
On R82 MGMT algif_aead is not in use. I dont have R82 gateway. I assume it could be used on the gateway for an IPsec VPN. I also assumed it might be used for MGMT for SIC, but it isn’t. Even if it is, the question is whether it’s possible to carry out an attack.
On RHEL (and Gaia is based on RHEL), it's not a module, it's built into the kernel. It's definitely present in R82 and R82.10.
As I wrote it works, but for the python version you need to be in a group (bin) which allows python to execute, but python is just an example, the bug is exploitanble in languages too.
PoC script for CVE-2026-31431
https://github.com/AliHzSec/CVE-2026-31431/blob/master/main.py
My conclusion: Even if the FW is vulnerable, an attacker would first need to gain access to the FW… so this vulnerability doesn’t really help them, since they already have access 🙂
Yes and no, remember the remote shell bug two years ago?
The official response is ready and available in sk184928
Quoting from there:
Practical risk: Low.
The vulnerability requires non-root local code execution, which the Gaia OS standard role model does not expose, because administrative access goes through Expert mode (already root), and non-admin roles are restricted to Clish.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 34 | |
| 12 | |
| 10 | |
| 9 | |
| 8 | |
| 7 | |
| 6 | |
| 6 | |
| 5 | |
| 4 |
Tue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceWed 13 May 2026 @ 11:00 AM (EDT)
TechTalk: The State of Ransomware Q1 2026: Key Trends and Their ImpactTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceTue 19 May 2026 @ 06:00 PM (IDT)
AI Security Masters E8 - Claude Mythos: New Era in Cyber SecurityAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY