- Products
- Learn
- Local User Groups
- Partners
- More
Access Control and Threat Prevention Best Practices
5 November @ 5pm CET / 11am ET
Firewall Uptime, Reimagined
How AIOps Simplifies Operations and Prevents Outages
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Spark Management Portal and More!
There are VA detected on checkpoint smart console as following. Kindly advise how to fix.
as a trail solution i have installed the latest build for smartconsole and the issue is still same
Medium | 205024 | CVE-2024-7264 | libcurl 7.32.0 < 8.9.1 DoS (CVE-2024-7264) | Upgrade Curl to version 8.9.1 or later |
|
Check Point firewalls are not vulnerable to CVE-2024-7264 because the vulnerability affects the libcurl library and Check Point products do not use this library.
Check Point firewalls are not vulnerable to CVE-2024-7264 because the vulnerability affects the libcurl library and Check Point products do not use this library.
is this not correct ?
In Check Point environments, the main reference to libcurl is through the command-line utility curl_cli. ?
is this not correct ?
I think so, yes.
Okay. Can we say that Check Point is not vulnerable to this CVE, or has Check Point not yet released any official information regarding it?
I even had TAC case about it before and they told me exact same thing, which is that CP firewalls are not vulnerable to mentioned CVE.
Oh, would you be able to share a screenshot, please?
This was few months ago, will see if I can find an email about it.
Thats just smart console folder.
Hey Andy,
You might have missed it but OP was not reporting a libcurl vulnerability on the gateway side, it's reported as being in SmartConsole.
-Ruan
I saw that, yes. Anyway, let Chris confirm internally, to be 100% sure.
This was investigated at the time and the vulnerable flow is not in use in our implementation.
Where required requests to upgrade the libcurl version can be made via your SE under the RFE process.
Thats more less what TAC advised as well.
Whilst I dislike any detection based solely on version I have asked internally about this.
Suggest raising a specific TAC case and looping in your SE aswell.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 24 | |
| 23 | |
| 12 | |
| 12 | |
| 9 | |
| 7 | |
| 7 | |
| 6 | |
| 6 | |
| 5 |
Wed 05 Nov 2025 @ 11:00 AM (EST)
TechTalk: Access Control and Threat Prevention Best PracticesThu 06 Nov 2025 @ 10:00 AM (CET)
CheckMates Live BeLux: Get to Know Veriti – What It Is, What It Does, and Why It MattersWed 05 Nov 2025 @ 11:00 AM (EST)
TechTalk: Access Control and Threat Prevention Best PracticesThu 06 Nov 2025 @ 10:00 AM (CET)
CheckMates Live BeLux: Get to Know Veriti – What It Is, What It Does, and Why It MattersTue 11 Nov 2025 @ 10:00 AM (CET)
Your First Response: Immediate Actions for Cyber Incident Containment- EMEAThu 20 Nov 2025 @ 05:00 PM (CET)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - AMERTue 11 Nov 2025 @ 06:00 PM (COT)
San Pedro Sula: Risk Management al Horno: ERM, TEM & Pizza NightTue 11 Nov 2025 @ 06:00 PM (COT)
San Pedro Sula: Risk Management al Horno: ERM, TEM & Pizza NightAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY