Over the past week, we've been monitoring attempts to gain unauthorized access to VPNs, which we attributed to CVE-2024-24919.
We quickly generated a fix which ensures these attempts are prevented once installed, and we are urging customers to install it to stay protected.
Check Point's task force has been working around the clock, to receive more relevant information and create more technical tools to ensure the security of our customers.
In this context, as another preventative measure, we automatically updated security gateways with an update which helps them protect their environments from various attempts to exploit the CVE. This is an interim measure until the fix is installed.
Installing the fix is required to fully address this vulnerability.
Thousands of organizations have already fully installed the fix Successfully.
We believe malicious actors are attempting to exploit this vulnerability - this install is crucial to ensure your organization is secured.
We have been constantly updating information on the CVE and the fix here, and recommend following it for most up to date information and analysis.
We value your collaboration in installing the fix, and the cooperation enabling us to better understand the situation and to provide you, in real time, with the tools and solutions needed to prevent future attacks.
This Cyber News was published on blog.checkpoint.com. Publication date: Mon, 03 Jun 2024 10:13:05 +0000