- Products
- Learn
- Local User Groups
- Partners
- More
The State of Ransomware Q1 2026
Key Trends and Their Impact
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
Here is the video recording of our session
Slides we used are also attached.
Please also watch the video by @Peter_Elmer explaining how to set up the IPS protections fro this vulnerability correctly:
Here are some of the Q&A which were not answered live:
A: The vulnerable component is the web server. As long as there is no web interface exposed to the internet it is not exploitable from outside the network. However, it is still important to patch it as it can be exploited from the internal network. The risk, however, is indeed smaller.
A: The recent wave of exploitation is related to CVE-53770, which is a patch bypass for CVE-2025-47704\6. The original vulnerabillity was reported as part of TrendMicro's Zeroday initiative in May in a contest called Pwn2Own. The name ToolShell is from them.
A: Yes, absolutely
A: It was originally released on July 21 and then updated on July 23.
A: CURRENTLY SUPPORTED versions of the client will run on:
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY