Over the past week, we’ve been monitoring attempts to gain unauthorized access to VPNs, which we attributed to CVE-2024-24919. We quickly generated a fix which ensures these attempts are prevented once installed, and we are urging customers to install it to stay protected (you can read the original post here).

Check Point’s task force has been working around the clock, to receive more relevant information and create more technical tools to ensure the security of our customers.

In this context, as another preventative measure, we automatically updated security gateways (which are registered to our Security Auto Update service) with an update which helps them protect their environments from various attempts to exploit the CVE. This is an interim measure until the fix is installed. Installing the fix is required to fully address this vulnerability.

Thousands of organizations have already fully installed the fix Successfully. We believe malicious actors are attempting to exploit this vulnerability – this install is crucial to ensure your organization is secured.

We have been constantly updating information on the CVE and the fix here, and recommend following it for most up to date information and analysis.

We value your collaboration in installing the fix, and the cooperation enabling us to better understand the situation and to provide you, in real time, with the tools and solutions needed to prevent future attacks.

You may also like