Skip to content

Exploit tool to validate CVE-2024-24919 vulnerability on Checkpoint Firewall VPNs

Notifications You must be signed in to change notification settings

GlobalsecureAcademy/CVE-2024-24919

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 

Repository files navigation

CVE-2024-24919

Exploit tool to validate CVE-2024-24919 vulnerability on Checkpoint Firewall VPNs

This tool creates an output folder containing a "Target-IP.txt" file. This file includes the contents of the /etc/passwd file from the affected target, thereby determining if the system is vulnerable or not.

In order to run this tool you only need Python 3. To run the tool, use the following command:

python3 CVE-2024-24919.py -i Target-IP

more information about the vulnerability on: https://thehackernews.com/2024/05/check-point-warns-of-zero-day-attacks.html

https://nvd.nist.gov/vuln/detail/CVE-2024-24919

https://www.rapid7.com/blog/post/2024/05/30/etr-cve-2024-24919-check-point-security-gateway-information-disclosure/

Remember to use this tool only on systems for which you have authorization.

This tool is intended solely for research and security auditing purposes.

Manuel Moreno - GLOBALSECURE https://www.linkedin.com/in/manu0x01/

About

Exploit tool to validate CVE-2024-24919 vulnerability on Checkpoint Firewall VPNs

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages