Checkpoint Security Vulnerabilities (CVEs)

Track 17 security vulnerabilities affecting Checkpoint products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.

11 High
6 Medium
🔔 Get Alerts for Checkpoint
CVE-2025-3831 8.1

The Harmony SASE agent may expose sensitive log files uploaded during troubleshooting to unauthorized parties. This information disclosure vulnerabili...

Aug 12, 2025
CVE-2024-52885 5.0

This directory traversal vulnerability in Check Point's Mobile Access Portal File Share application allows authenticated malicious users to list file ...

Aug 6, 2025
CVE-2025-2028 6.5

This vulnerability allows man-in-the-middle attackers to intercept and modify CSV files containing IP-to-country mappings during download due to missi...

Aug 6, 2025
CVE-2024-24915 6.1

CVE-2024-24915 is a memory disclosure vulnerability in Check Point SmartConsole where credentials remain in memory after use. Administrators can dump ...

Jun 29, 2025
CVE-2024-52888 5.4

This CVE describes a cross-site scripting (XSS) vulnerability in a Check Point portal where authenticated users can execute scripts when viewing direc...

Apr 27, 2025
CVE-2024-24911 5.3

This vulnerability causes the cpca process on Check Point Security Management/Domain Management Servers to crash unexpectedly in rare scenarios, creat...

Feb 6, 2025
CVE-2024-24914 8.0

Authenticated users on Check Point Gaia systems can inject code or commands through global variables via HTTP requests. This vulnerability affects Che...

Nov 7, 2024
CVE-2024-24912 6.7

This CVE describes a local privilege escalation vulnerability in Check Point Harmony Endpoint Security Client for Windows. An attacker with existing l...

May 1, 2024
CVE-2024-24910 7.3

This vulnerability allows a local attacker with existing privileged code execution to escalate privileges on affected Check Point security products. I...

Apr 18, 2024
CVE-2023-28134 7.8

CVE-2023-28134 is a local privilege escalation vulnerability in Check Point Harmony Endpoint and ZoneAlarm Extreme Security. An attacker with low-priv...

Nov 12, 2023
CVE-2023-28130 7.2

CVE-2023-28130 is a command injection vulnerability in Check Point Gaia Portal's hostnames page that allows authenticated local users to execute arbit...

Jul 26, 2023
CVE-2023-28133 7.8

CVE-2023-28133 allows local attackers to escalate privileges on Windows systems running Check Point Endpoint Security Client E87.30 by crafting a mali...

Jul 23, 2023
CVE-2022-23745 7.5

A memory corruption vulnerability in the Capsule Workspace Android app on GrapheneOS could cause application crashes through potential memory corrupti...

Jul 18, 2022
CVE-2022-23742 7.8

This vulnerability in Check Point Endpoint Security Client for Windows allows attackers to replace files copied for forensics reports with malicious c...

May 12, 2022
CVE-2022-23743 7.8

CVE-2022-23743 is a local privilege escalation vulnerability in Check Point ZoneAlarm security software. It allows a local attacker to execute arbitra...

May 11, 2022
CVE-2021-30359 7.8

This vulnerability allows attackers to escalate privileges by exploiting the MSI installer repair function in Checkpoint Harmony Browse and SandBlast ...

Oct 22, 2021
CVE-2021-30356 8.1

A privilege escalation vulnerability in Check Point Identity Agent allows low-privileged users to overwrite protected system files, potentially leadin...

Apr 22, 2021

Why Monitor Checkpoint Security Vulnerabilities?

Real-time CVE tracking: Our automated system monitors 17+ known vulnerabilities affecting Checkpoint products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.

Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Checkpoint packages in under 60 seconds. No agents required - completely agentless scanning that works across Checkpoint deployments.

Free vulnerability database: Access detailed information about every Checkpoint CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.

🚀 Get Started in 60 Seconds

  • Register free account & add your servers
  • Run one-time scan or schedule automatic monitoring (every 1-24 hours)
  • Receive instant alerts when new Checkpoint CVEs affect your systems
  • Access dashboard with severity breakdown & fix instructions
Start Monitoring Checkpoint CVEs Free