Vulnerability Description
Authenticated Gaia users can inject code or commands by global variables through special HTTP requests. A Security fix that mitigates this vulnerability is available.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Checkpoint | Gaia Os | r81 |
| Checkpoint | Clusterxl | - |
| Checkpoint | Multi-Domain Management | - |
| Checkpoint | Quantum 6700 | - |
| Checkpoint | Quantum Maestro | - |
| Checkpoint | Quantum Scalable Chassis | - |
| Checkpoint | Quantum Security Gateway | - |
| Checkpoint | Quantum Security Management | - |
| Checkpoint | Quantum Spark | - |
Related Weaknesses (CWE)
References
- https://support.checkpoint.com/results/sk/sk182743Vendor Advisory
FAQ
What is CVE-2024-24914?
CVE-2024-24914 is a vulnerability with a CVSS score of 8.0 (HIGH). Authenticated Gaia users can inject code or commands by global variables through special HTTP requests. A Security fix that mitigates this vulnerability is available.
How severe is CVE-2024-24914?
CVE-2024-24914 has been rated HIGH with a CVSS base score of 8.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-24914?
Check the references section above for vendor advisories and patch information. Affected products include: Checkpoint Gaia Os, Checkpoint Clusterxl, Checkpoint Multi-Domain Management, Checkpoint Quantum 6700, Checkpoint Quantum Maestro.