Check Point to customers: Patch your VPN ASAP
Briefly

Check Point detected login attempts targeting customers' VPN environments, identified the CVE-2024-24919 vulnerability, and advised immediate software updates for CloudGuard Network, Quantum Maestro, and more.
"Password-only authentication is considered an unfavourable method for network security; Check Point urges against relying on it. Exploiting the vulnerability could grant attackers access to sensitive information and domain administrator privileges."
"Mnemonic revealed the zero-day allows retrieval of local files, including password hashes and critical data. Check Point advises users to enhance VPN security alongside applying patches to mitigate risks."
Read at Theregister
[
|
]