Share
## https://sploitus.com/exploit?id=D9818382-9B08-5D48-819A-ED236D2972A1
# CVE-2024-24919
Exploit tool to validate CVE-2024-24919 vulnerability on Checkpoint Firewall VPNs

This tool creates an output folder containing a "Target-IP.txt" file. This file includes the contents of the /etc/passwd file from the affected target, thereby determining if the system is vulnerable or not.

In order to run this tool you only need Python 3. To run the tool, use the following command:

python3 CVE-2024-24919.py -i Target-IP

more information about the vulnerability on:
https://thehackernews.com/2024/05/check-point-warns-of-zero-day-attacks.html

https://nvd.nist.gov/vuln/detail/CVE-2024-24919

https://www.rapid7.com/blog/post/2024/05/30/etr-cve-2024-24919-check-point-security-gateway-information-disclosure/

# Remember to use this tool only on systems for which you have authorization.
# This tool is intended solely for research and security auditing purposes.
Manuel Moreno - GLOBALSECURE
https://www.linkedin.com/in/manu0x01/