Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-24919 PoC — Information disclosure

Source
Associated Vulnerability
Title:Information disclosure (CVE-2024-24919)
Description:Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available.
Readme
### CVE-2024-24919

Exploit script for CVE-2024-24919.

Shodan:
- ```"Server: Check Point SVN" "X-UA-Compatible: IE=EmulateIE7"```

FOFA:
- ```title="Check Point SSL Network Extender"```

I am not responsible for any misuse or damage caused by this script.
File Snapshot

[4.0K] /data/pocs/d144cd65b37003de2aecdd8abbdffd93f0d91739 ├── [2.8K] CVE-2024-24919.py └── [ 257] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →