CVE-2024-24910

7.3 HIGH

📋 TL;DR

This vulnerability allows a local attacker with existing privileged code execution to escalate privileges on affected Check Point security products. It affects Check Point ZoneAlarm ExtremeSecurity NextGen, Identity Agent for Windows, and Identity Agent for Windows Terminal Server. Attackers must already have local privileged access to exploit this weakness.

💻 Affected Systems

Products:
  • Check Point ZoneAlarm ExtremeSecurity NextGen
  • Check Point Identity Agent for Windows
  • Check Point Identity Agent for Windows Terminal Server
Versions: Specific versions not detailed in provided references; check vendor advisory for exact affected versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Windows-based Check Point security products; requires local privileged code execution capability to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where an attacker gains full administrative control over the affected system, potentially leading to data theft, persistence mechanisms, and lateral movement.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, install malware, or access protected resources on the compromised system.

🟢

If Mitigated

Limited impact if proper access controls and least privilege principles are enforced, though the vulnerability still provides escalation opportunities.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring existing local access, not directly exploitable from the internet.
🏢 Internal Only: HIGH - Once an attacker gains initial access to a system (through phishing, malware, etc.), this vulnerability enables significant privilege escalation within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Once an attacker has local privileged code execution, exploitation is straightforward.

Exploitation requires existing local privileged access; this is not a remote code execution vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory SK182219 for specific patched versions

Vendor Advisory: https://support.checkpoint.com/results/sk/sk182219

Restart Required: Yes

Instructions:

1. Review Check Point advisory SK182219. 2. Download and apply the latest patches from Check Point. 3. Restart affected systems. 4. Verify patch installation.

🔧 Temporary Workarounds

Restrict Local Administrative Access

windows

Limit local administrative privileges to reduce attack surface for privilege escalation.

Implement Application Whitelisting

windows

Use application control policies to prevent unauthorized code execution.

🧯 If You Can't Patch

  • Implement strict least privilege access controls to limit local administrative rights
  • Monitor for suspicious privilege escalation attempts using endpoint detection and response (EDR) tools

🔍 How to Verify

Check if Vulnerable:

Check installed Check Point product versions against vendor advisory SK182219

Check Version:

Check product-specific documentation; typically through Check Point management interfaces or Windows Programs and Features

Verify Fix Applied:

Verify patch installation through Check Point management console or version checking commands

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation events
  • Suspicious process creation with elevated privileges
  • Check Point service manipulation attempts

Network Indicators:

  • Not applicable - local exploitation only

SIEM Query:

EventID=4688 AND (ProcessName contains 'checkpoint' OR ProcessName contains 'zonealarm') AND NewProcessName contains privileged commands

🔗 References

📤 Share & Export