Exploit tool to validate CVE-2024-24919 vulnerability on Checkpoint Firewall VPNs
This tool creates an output folder containing a "Target-IP.txt" file. This file includes the contents of the /etc/passwd file from the affected target, thereby determining if the system is vulnerable or not.
In order to run this tool you only need Python 3. To run the tool, use the following command:
python3 CVE-2024-24919.py -i Target-IP
more information about the vulnerability on: https://thehackernews.com/2024/05/check-point-warns-of-zero-day-attacks.html
https://nvd.nist.gov/vuln/detail/CVE-2024-24919
Manuel Moreno - GLOBALSECURE https://www.linkedin.com/in/manu0x01/