CERT-In warns users about bug in Checkpoint gateway products
Attackers can use the vulnerability to access certain information on internet-connected gateways configured with IPSec VPN, remote access VPN, or mobile access software blades
image for illustrative purpose
The Indian Computer Emergency Response Team (CERT-In) has warned about a vulnerability in Checkpoint Network Security gateway products, which could allow hackers to compromise users’ data.
According to its advisory by the national cyber-security agency, attackers can use the vulnerability to access certain information on “internet-connected gateways configured with IPSec VPN, remote access VPN, or mobile access software blades”.
This, in certain scenarios, could potentially lead the attacker to move laterally and gain domain admin privileges, warned the agency.
The vulnerability exists in Checkpoint Network Security gateway products due to the unrecommended password-only authentication method.
“The vulnerability (CVE-2024-24919) is being exploited in the wild,” said CERT-In, urging users to apply fixes issued by the company.
Checkpoint has discovered the vulnerability and issued the fix.
“Following our security update, Check Point's dedicated task force continues investigating attempts to gain unauthorised access to VPN products used by our customers,” said the company in its security update.