Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-24919 PoC — Information disclosure

Source
Associated Vulnerability
Title:Information disclosure (CVE-2024-24919)
Description:Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available.
Description
Python script to automate the process of finding vulnerable sites for CVE-2024-24919.
Readme
# Vulnerability Scanner for CVE-2024-24919 (need Shodan API)

Script 1 will use the Shodan API to find potentially vulnerable sites. Script 2 will perform a PoC to confirm which sites are vulnerable.

## Usage
1. Open a terminal and navigate to the directory where the script is located.
2. Run the script:
 
    ```sh
    pip install -r requirements.txt
    ```
3. Run the script:
    ```sh
    python .\1-CVE-2024-24919-Shodan-Search.py -api XXX
    ```
4. Run the script:
    ```sh
    python .\2-CVE-2024-24919-PoC.py
    ```
File Snapshot

[4.0K] /data/pocs/ab1e910a1d35d61e619d65836bef862a6276b111 ├── [2.7K] 1-CVE-2024-24919-Shodan-Search.py ├── [2.6K] 2-CVE-2024-24919-PoC.py ├── [ 547] README.md └── [ 32] requirements.txt 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →