CVE-2024-24914

8.0 HIGH

📋 TL;DR

Authenticated users on Check Point Gaia systems can inject code or commands through global variables via HTTP requests. This vulnerability affects Check Point security gateways and management servers running vulnerable Gaia versions. Attackers with valid credentials can potentially execute arbitrary code.

💻 Affected Systems

Products:
  • Check Point Security Gateway
  • Check Point Security Management Server
Versions: R81.20, R81.10, R81, R80.40, R80.30, R80.20
Operating Systems: Check Point Gaia OS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Gaia web interface enabled and accessible to authenticated users.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise leading to data exfiltration, lateral movement within the network, and persistent backdoor installation.

🟠

Likely Case

Privilege escalation leading to unauthorized administrative access and configuration changes.

🟢

If Mitigated

Limited impact due to network segmentation and strict access controls limiting authenticated user access.

🌐 Internet-Facing: HIGH - If management interfaces are exposed to the internet, attackers can exploit this remotely.
🏢 Internal Only: MEDIUM - Requires authenticated access, but insider threats or compromised credentials could lead to exploitation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access but exploitation appears straightforward based on the CWE-914 (Improper Control of Dynamically-Identified Variables) classification.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: R81.20.20, R81.10.30, R81.10.20, R81.10.10, R81.10, R81, R80.40.40, R80.40.30, R80.40.20, R80.40.10, R80.40, R80.30.40, R80.30.30, R80.30.20, R80.30.10, R80.30, R80.20.40, R80.20.30, R80.20.20, R80.20.10, R80.20

Vendor Advisory: https://support.checkpoint.com/results/sk/sk182743

Restart Required: Yes

Instructions:

1. Log into Check Point support center. 2. Download the relevant hotfix for your Gaia version. 3. Install the hotfix via Gaia web interface or CLI. 4. Reboot the system as required.

🔧 Temporary Workarounds

Restrict Gaia Web Interface Access

all

Limit access to Gaia web interface to trusted IP addresses only

Configure firewall rules to restrict access to Gaia management ports (TCP 443, TCP 80)

Disable Unnecessary Gaia Services

linux

Disable Gaia web interface if not required for operations

Expert mode: cpstop httpsd
Expert mode: cpstop httpd

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Gaia management interfaces
  • Enforce strong authentication policies and monitor for suspicious authenticated user activity

🔍 How to Verify

Check if Vulnerable:

Check Gaia version via CLI: 'show version all' and compare against affected versions list

Check Version:

show version all

Verify Fix Applied:

Verify hotfix installation: 'cpinfo -y all' and check for the specific hotfix ID

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests to Gaia web interface with parameter manipulation
  • Multiple failed authentication attempts followed by successful login

Network Indicators:

  • Unusual outbound connections from Gaia management interfaces
  • HTTP requests with suspicious parameter values

SIEM Query:

source="gaia_web_logs" AND (url="*global*" OR params="*variable*")

🔗 References

📤 Share & Export