A solution has been released to combat attacks targeting a small number of remote access VPN users.
The cause of these attacks has been identified and a fix has been released. It is very important to install this patch on Check Point Network Security gateways to stay protected.
The discovered vulnerability (CVE-2024-24919) affects Security Gateways with remote access VPN or mobile access blade enabled. It potentially allows an attacker to read certain information on gateways when connected to the Internet with remote access VPN or mobile access enabled.
The fix prevents this vulnerability from being exploited once deployed on the affected gateways. Install it now to stay protected.
So far, the observed attack attempts have focused on remote access to legacy local accounts with non-recommended password-only authentication. This applies to the small number of clients we mentioned earlier. The Check Point network remains unaffected.
More information you can be found on partner’s blog.
Customer safety is our top priority. We stand ready to assist you and will continue to investigate this issue, providing additional updates as needed. For more information, please contact our team.