CVE-2024-24919

ENISA EUVD: EUVD-2024-22282 ↗
Exploited in the Wild ✓ Confirmed 0-Day
Triaged: March 5, 2026 10 articles Published: 2024-05-28

EPSS Score

Source: FIRST.org · 2026-05-23
94.39%
probability
This CVE has a 94.39% probability of being exploited in the next 30 days.
0% Top 100.0th percentile of all CVEs 100%

CVSS v3.1

Source: VulnerabilityLookup (CIRCL)
8.6
HIGH
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
None
Availability
None
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

Description

VulnerabilityLookup (CNA)
Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available.

Affected Products

checkpoint
Check Point Quantum Gateway, Spark Gateway and CloudGuard Network
Check Point Quantum Gateway and CloudGuard Network versions R81.20, R81.10, R81, R80.40 and Check Point Spark versions R81.10, R80.20.

Attack Intelligence

Exploits & PoC

ifconfig-me/CVE-2024-24919-Bulk-Scanner

CVE-2024-24919 [Check Point Security Gateway Information Disclosure]

31 2024-06-02
RevoltSecurities/CVE-2024-24919

An Vulnerability detection and Exploitation tool for CVE-2024-24919

25 2024-06-05
GoatSecurity/CVE-2024-24919

CVE-2024-24919 exploit

19 2024-05-31
un9nplayer/CVE-2024-24919

This repository contains a proof-of-concept (PoC) exploit for CVE-2024-24919, a critical vulnerability discovered in Check Point SVN. The vulnerabilit

16 2024-06-05
LucasKatashi/CVE-2024-24919

CVE-2024-24919 Exploit PoC

12 2024-05-30
verylazytech/CVE-2024-24919

POC - CVE-2024–24919 - Check Point Security Gateways

9 2024-11-26
c3rrberu5/CVE-2024-24919

Nuclei Template to discover CVE-2024-24919. A path traversal vulnerability in CheckPoint SSLVPN.

7 2024-05-30
geniuszly/CVE-2024-24919

PoC script for CVE-2024-24919 vulnerability. It scans a list of target URLs to identify security issues by sending HTTP POST requests and analyzing se

6 2024-09-29
emanueldosreis/CVE-2024-24919

POC exploit for CVE-2024-24919 information leakage

5 2024-05-30
smackerdodi/CVE-2024-24919-nuclei-templater

Nuclei template for CVE-2024-24919

5 2024-05-31
zam89/CVE-2024-24919

Simple POC Python script that check & leverage Check Point CVE-2024-24919 vulnerability (Wrong Check Point)

4 2024-05-31
GuayoyoCyber/CVE-2024-24919

Nmap script to check vulnerability CVE-2024-24919

4 2024-06-04
Bytenull00/CVE-2024-24919

Quick and simple script that takes as input a file with multiple URLs to check for the CVE-2024-24919 vulnerability in CHECKPOINT

3 2024-05-30
GlobalsecureAcademy/CVE-2024-24919

Exploit tool to validate CVE-2024-24919 vulnerability on Checkpoint Firewall VPNs

3 2024-05-31
bigb0x/CVE-2024-24919-Sniper

CVE-2024-24919 Sniper - A powerful tool for scanning Check Point Security Gateway CVE-2024-24919 vulnerability. Supports single & bulk scanning, multi

3 2024-06-02
Rug4lo/CVE-2024-24919-Exploit

CVE-2024-24919 Exploit and PoC - Critical LFI for Remote Access VPN or Mobile Access.

3 2024-06-03
Cappricio-Securities/CVE-2024-24919

Check Point Security Gateway (LFI)

2 2024-06-24
r4p3c4/CVE-2024-24919-Exploit-PoC-Checkpoint-Firewall-VPN

Herramienta de explotación para explotar la vulnerabilidad CVE-2024-24919 en las VPN de Checkpoint Firewall

2 2024-06-01
NingXin2002/Check-Point_poc

Check-Point安全网关任意文件读取漏洞(CVE-2024-24919)

2 2024-12-21
satriarizka/CVE-2024-24919

A simple bash and python script to check for the vulnerability CVE-2024-24919

1 2024-05-31
r4p3c4/CVE-2024-24919-Checkpoint-Firewall-VPN-Check

Esta herramienta se utiliza para validar la vulnerabilidad CVE-2024-24919 en las VPN de Checkpoint Firewall

1 2024-06-01
starlox0/CVE-2024-24919-POC

A Simple Exploit Code(POC) to Automate CVE-2024–24919

1 2024-06-06
hashdr1ft/SOC_287

SOC287 - Arbitrary File Read on Checkpoint Security Gateway [CVE-2024-24919]

1 2025-02-05
YN1337/CVE-2024-24919

Mass scanner for CVE-2024-24919

0 2024-06-01
Expl0itD0g/CVE-2024-24919---Poc

a Proof of Concept of CVE-2024-24919

0 2024-06-02
nullcult/CVE-2024-24919-Exploit

CVE-2024-24919 exploit that checks more files for better visibility

0 2024-06-07
H3KEY/CVE-2024-24919

Hello everyone, I am sharing a modified script from CVE-2024-24919 which can extract paths categorized as critical.

0 2024-07-22
AhmedMansour93/Event-ID-263-Rule-Name-SOC287---Arbitrary-File-Read-on-Checkpoint-Security-Gateway-CVE-2024-24919-

🔍 Just wrapped up an incident report on a Phishing Alert (Event ID 257, SOC282). Enhancing my expertise in email threat detection and response! 🚨 #Cyb

0 2024-08-31
sar-3mar/CVE-2024-24919_POC

It's Proof of Concept on CVE-2024-24919-POC , i made it after it's discoverd

0 2024-10-28
57 repos — triés par ⭐ Rechercher sur GitHub ↗

Signal Intelligence

Confidence
95%
EPSS 94.39%
CVSS v3.1 8.6
Mentions 10
Last Seen Feb 25, 2025

CNA Information

CNA Assigner
checkpoint
CNA Title
Information disclosure

Analyst Note

CVE-2024-24919 meets all zero-day criteria: exploitation in the wild is explicitly documented (attacks since April 30, 2024), the CVE was published May 28, 2024, and authoritative sources (BleepingComputer, CERT-EU) explicitly label it as a zero-day with emergency patching. Exploitation clearly preceded or occurred contemporaneously with patch availability.

Threat Actors 41

Lazarus Group
apt_group Information theft and espionage 🇰🇵 KP
APT 29
apt_group Information theft and espionage 🇷🇺 RU
DarkHotel
apt_group Information theft and espionage 🇰🇷 KR
Mustang Panda
apt_group Information theft and espionage 🇨🇳 CN
Cobalt
apt_group Financial crime 🇷🇺 RU
APT 28
apt_group Information theft and espionage 🇷🇺 RU
Harvester
apt_group Information theft and espionage Unknown
Hacking Team
apt_group 🇮🇹 IT
Chamelgang
apt_group Information theft and espionage 🇨🇳 CN
Sea Turtle
apt_group Information theft and espionage 🇹🇷 TR
Tick
apt_group Information theft and espionage 🇨🇳 CN
APT3
apt_group Information theft and espionage 🇨🇳 CN
Infy
apt_group Information theft and espionage 🇮🇷 IR
Volt Typhoon
apt_group Information theft and espionage 🇨🇳 CN
Group 27
apt_group Information theft and espionage 🇨🇳 CN
ArcaneDoor
apt_group 🇨🇳 CN
APT-C-36
apt_group Information theft and espionage 🇨🇴 CO
Silence group
apt_group Financial crime 🇷🇺 RU
APT42
apt_group Information theft and espionage 🇮🇷 IR
Storm-2077
apt_group Information theft and espionage 🇨🇳 CN
TAG-100
apt_group Information theft and espionage 🇨🇳 CN
Fox Kitten
apt_group Information theft and espionage 🇮🇷 IR
Returned Libra
apt_group 🇨🇳 CN
APT 22
apt_group Information theft and espionage 🇨🇳 CN
Rocke
apt_group 🇨🇳 CN
APT 6
apt_group Information theft and espionage 🇨🇳 CN
Bitwise Spider
apt_group Financial gain 🇷🇺 RU
Red Dev 17
apt_group 🇨🇳 CN
CoreInjection
apt_group 🇮🇱 IL
Red October
apt_group 🇷🇺 RU
Circles
apt_group Global
Operation Digital Eye
apt_group Information theft and espionage 🇨🇳 CN
Shadow Network
apt_group Information theft and espionage 🇨🇳 CN
Mana Team
apt_group 🇨🇳 CN
Iron Group
apt_group Information theft and espionage 🇨🇳 CN
Operation ShadowHammer
apt_group 🇨🇳 CN
APT 5
apt_group Information theft and espionage 🇨🇳 CN
Beijing Group
apt_group Information theft and espionage 🇨🇳 CN
Operation Black Atlas
apt_group Financial crime
Operation Crimson Palace
apt_group Information theft and espionage 🇨🇳 CN
Dark Partners
apt_group

Triage Info

Decided atMar 05, 2026
Published DateMay 28, 2024