CVE-2024-24910
📋 TL;DR
This vulnerability allows a local attacker with existing privileged code execution to escalate privileges on affected Check Point security products. It affects Check Point ZoneAlarm ExtremeSecurity NextGen, Identity Agent for Windows, and Identity Agent for Windows Terminal Server. Attackers must already have local privileged access to exploit this weakness.
💻 Affected Systems
- Check Point ZoneAlarm ExtremeSecurity NextGen
- Check Point Identity Agent for Windows
- Check Point Identity Agent for Windows Terminal Server
📦 What is this software?
Identity Agent by Checkpoint
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise where an attacker gains full administrative control over the affected system, potentially leading to data theft, persistence mechanisms, and lateral movement.
Likely Case
Local privilege escalation allowing attackers to bypass security controls, install malware, or access protected resources on the compromised system.
If Mitigated
Limited impact if proper access controls and least privilege principles are enforced, though the vulnerability still provides escalation opportunities.
🎯 Exploit Status
Exploitation requires existing local privileged access; this is not a remote code execution vulnerability.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check vendor advisory SK182219 for specific patched versions
Vendor Advisory: https://support.checkpoint.com/results/sk/sk182219
Restart Required: Yes
Instructions:
1. Review Check Point advisory SK182219. 2. Download and apply the latest patches from Check Point. 3. Restart affected systems. 4. Verify patch installation.
🔧 Temporary Workarounds
Restrict Local Administrative Access
windowsLimit local administrative privileges to reduce attack surface for privilege escalation.
Implement Application Whitelisting
windowsUse application control policies to prevent unauthorized code execution.
🧯 If You Can't Patch
- Implement strict least privilege access controls to limit local administrative rights
- Monitor for suspicious privilege escalation attempts using endpoint detection and response (EDR) tools
🔍 How to Verify
Check if Vulnerable:
Check installed Check Point product versions against vendor advisory SK182219
Check Version:
Check product-specific documentation; typically through Check Point management interfaces or Windows Programs and Features
Verify Fix Applied:
Verify patch installation through Check Point management console or version checking commands
📡 Detection & Monitoring
Log Indicators:
- Unusual privilege escalation events
- Suspicious process creation with elevated privileges
- Check Point service manipulation attempts
Network Indicators:
- Not applicable - local exploitation only
SIEM Query:
EventID=4688 AND (ProcessName contains 'checkpoint' OR ProcessName contains 'zonealarm') AND NewProcessName contains privileged commands