- Products
- Learn
- Local User Groups
- Partners
- More
Firewall Uptime, Reimagined
How AIOps Simplifies Operations and Prevents Outages
Introduction to Lakera:
Securing the AI Frontier!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Here is the video recording of our session
Slides we used are also attached.
Please also watch the video by @Peter_Elmer explaining how to set up the IPS protections fro this vulnerability correctly:
Here are some of the Q&A which were not answered live:
A: The vulnerable component is the web server. As long as there is no web interface exposed to the internet it is not exploitable from outside the network. However, it is still important to patch it as it can be exploited from the internal network. The risk, however, is indeed smaller.
A: The recent wave of exploitation is related to CVE-53770, which is a patch bypass for CVE-2025-47704\6. The original vulnerabillity was reported as part of TrendMicro's Zeroday initiative in May in a contest called Pwn2Own. The name ToolShell is from them.
A: Yes, absolutely
A: It was originally released on July 21 and then updated on July 23.
A: CURRENTLY SUPPORTED versions of the client will run on:
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY