- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Call For Papers
Your Expertise. Our Stage
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
There are VA detected on checkpoint smart console as following. Kindly advise how to fix.
as a trail solution i have installed the latest build for smartconsole and the issue is still same
Medium | 205024 | CVE-2024-7264 | libcurl 7.32.0 < 8.9.1 DoS (CVE-2024-7264) | Upgrade Curl to version 8.9.1 or later |
|
Check Point firewalls are not vulnerable to CVE-2024-7264 because the vulnerability affects the libcurl library and Check Point products do not use this library.
Check Point firewalls are not vulnerable to CVE-2024-7264 because the vulnerability affects the libcurl library and Check Point products do not use this library.
is this not correct ?
In Check Point environments, the main reference to libcurl is through the command-line utility curl_cli. ?
is this not correct ?
I think so, yes.
Okay. Can we say that Check Point is not vulnerable to this CVE, or has Check Point not yet released any official information regarding it?
I even had TAC case about it before and they told me exact same thing, which is that CP firewalls are not vulnerable to mentioned CVE.
Oh, would you be able to share a screenshot, please?
This was few months ago, will see if I can find an email about it.
Thats just smart console folder.
Hey Andy,
You might have missed it but OP was not reporting a libcurl vulnerability on the gateway side, it's reported as being in SmartConsole.
-Ruan
I saw that, yes. Anyway, let Chris confirm internally, to be 100% sure.
This was investigated at the time and the vulnerable flow is not in use in our implementation.
Where required requests to upgrade the libcurl version can be made via your SE under the RFE process.
Thats more less what TAC advised as well.
Whilst I dislike any detection based solely on version I have asked internally about this.
Suggest raising a specific TAC case and looping in your SE aswell.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 67 | |
| 26 | |
| 13 | |
| 12 | |
| 12 | |
| 9 | |
| 8 | |
| 8 | |
| 8 | |
| 7 |
Tue 21 Apr 2026 @ 05:00 PM (IDT)
AI Security Masters E7: How CPR Broke ChatGPT's Isolation and What It Means for YouTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 21 Apr 2026 @ 05:00 PM (IDT)
AI Security Masters E7: How CPR Broke ChatGPT's Isolation and What It Means for YouTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY