## https://sploitus.com/exploit?id=D9818382-9B08-5D48-819A-ED236D2972A1
# CVE-2024-24919
Exploit tool to validate CVE-2024-24919 vulnerability on Checkpoint Firewall VPNs
This tool creates an output folder containing a "Target-IP.txt" file. This file includes the contents of the /etc/passwd file from the affected target, thereby determining if the system is vulnerable or not.
In order to run this tool you only need Python 3. To run the tool, use the following command:
python3 CVE-2024-24919.py -i Target-IP
more information about the vulnerability on:
https://thehackernews.com/2024/05/check-point-warns-of-zero-day-attacks.html
https://nvd.nist.gov/vuln/detail/CVE-2024-24919
https://www.rapid7.com/blog/post/2024/05/30/etr-cve-2024-24919-check-point-security-gateway-information-disclosure/
# Remember to use this tool only on systems for which you have authorization.
# This tool is intended solely for research and security auditing purposes.
Manuel Moreno - GLOBALSECURE
https://www.linkedin.com/in/manu0x01/