- Products
- Learn
- Local User Groups
- Partners
- More
Access Control and Threat Prevention Best Practices
5 November @ 5pm CET / 11am ET
Ask Check Point Threat Intelligence Anything!
October 28th, 9am ET / 3pm CET
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
Spark Management Portal and More!
Here is the video recording of our session
Slides we used are also attached.
Please also watch the video by @Peter_Elmer explaining how to set up the IPS protections fro this vulnerability correctly:
Here are some of the Q&A which were not answered live:
A: The vulnerable component is the web server. As long as there is no web interface exposed to the internet it is not exploitable from outside the network. However, it is still important to patch it as it can be exploited from the internal network. The risk, however, is indeed smaller.
A: The recent wave of exploitation is related to CVE-53770, which is a patch bypass for CVE-2025-47704\6. The original vulnerabillity was reported as part of TrendMicro's Zeroday initiative in May in a contest called Pwn2Own. The name ToolShell is from them.
A: Yes, absolutely
A: It was originally released on July 21 and then updated on July 23.
A: CURRENTLY SUPPORTED versions of the client will run on:
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY