SOC287 - Arbitrary File Read On Checkpoint Security Gateway (CVE-2024-24919)
SOC287 - Arbitrary File Read On Checkpoint Security Gateway (CVE-2024-24919)
Event ID : 263
Rule Name : SOC287 - Arbitrary File Read on
Checkpoint Security Gateway [CVE-2024-24919]
Table of contents
Official incident report 1
Rule Name: SOC287 - Arbitrary File Read on Checkpoint Security Gateway [CVE-2024-24919] 1
Table of contents 2
Event Details 3
Detection 4
Threat intelligence 4
Analysis 11
Log management 11
Conclusion 20
Event Details
Event ID:
263
Rule:
SOC287 - Arbitrary File Read on Checkpoint Security Gateway [CVE-2024-24919]
Level:
Security Analyst
Description:
Characteristics exploit pattern Detected on Request, indicative exploitation of the CVE-2024-
24919.
Source Address:
203.160.68.12
Detection Section
According to the VirusTotal analysis, the IP address was flagged by 3 out of 93 security vendors
as malicious. Below are the details:
• Fortinet: Malware
• SOCRadar: Phishing
• Webroot: Malicious
• alphaMountain.ai: Suspicious
• CyRadar: Suspicious
• Abusix: Clean
Basic Properties:
• Network: 203.160.64.0/19
• Autonomous System Number: 10099
• Autonomous System Label: China Unicom Global
• Regional Internet Registry: APNIC
• Country: Hong Kong (HK)
• Continent: Asia (AS)
There are two comments in the community section related to this IP address:
1. Comment by patricksvgrapi:
o Description: This indicator was mentioned in a report.
o Title: Advisory: Active exploitation of Check Point Remote Access VPN vulnerability (CVE-
2024-24919)
o Reference: https://www.mnemonic.io/resources/blog/advisory-check-point-remote-
access-vpn-vulnerability-cve-2024-24919/
o Report Publish Date: 2024-05-29
o Reference ID: #4d0076650
2. Comment by cdscybersoc:
o Description: Peaksys - Port Scan
o Date: 2024-05-30 16:04:00 UTC+01
CVE-2024-24919: Overview
CVE-2024-24919 refers to a critical vulnerability affecting Check Point's Remote Access VPN
products. This flaw allows for the possibility of unauthorized access due to inadequate validation
of user credentials during the authentication process. Exploiting this vulnerability, an attacker
could potentially gain unauthorized access to sensitive systems, bypass security controls, and
escalate privileges. This vulnerability is particularly concerning because it targets a critical
component of network security infrastructure, which is often used to protect sensitive corporate
networks and data.
Result 1
IP Address: 203.160.68.12
• Reporter: NSCA-ISEU
o IoA Timestamp (UTC): 2024-06-01 07:31:52
o Comment: Check Point VPN Information Disclosure (CVE-2024-24919)
o VirusTotal: Malicious: 1, Suspicious: 0
o AS Number: AS10099
o ISP: China Unicom Global, China Unicom (Hong Kong) Operations Limited
o Categories: Port Scan and Web App Attack
• Reporter: Cyber SOC
o IoA Timestamp (UTC): 2024-05-30 15:04:32
o Comment: Peaksys - 2024-05-30 16:04:00 UTC+01
o Categories: Port Scan
VirusTotal
The IP address 203.160.68.12 has been flagged as malicious by 3 out of 92 security vendors. The
issues identified include malware and phishing activities, with some vendors marking it as
suspicious. However, not all vendors agree, as some did not flag it as malicious.
AbuseIPDB
This IP address appears in the AbuseIPDB database with only 2 reports and a low abuse
confidence level of 7%. This suggests that while there have been some reports, the history of
abuse or malicious activity associated with this IP is not strong.
LetsDefend
Summary
The IP address 203.160.68.12 presents mixed results. While VirusTotal shows some reports of
malicious activity, including malware and phishing, the reports on AbuseIPDB are minimal and
have low confidence. Additionally, its association with [CVE-2024-24919] on LetsDefend adds
a layer of concern, although the details are not fully transparent.
Overall, further investigation is necessary to determine the true nature of this IP address. Given
its ties to known vulnerabilities and the mixed security assessments, caution and deeper analysis
are advised.
Analysis:
Log Management
So, I jumped into the log management section, and to get the juicy details, I filtered the results. I did this
by selecting the Destination address and then punching in the victim server's IP.
So, I checked out the logs, specifically the FIREWALL type, and found this gem:
• Username: guest
• EventID: 4625 (An account failed to log on)
Looks like someone might be trying a brute force attack to crack the login!
Log Details
Notable Entries
1. IP: 203.160.68.12
o Timestamp: 06/Jun/2024:15:12:43 +0000
2. IP: 203.160.68.12
o Timestamp: 06/Jun/2024:15:12:45 +0000
o Request: POST /clients/MyCRL HTTP/1.1
o Response: 200 (OK)
o Request Body: "aCSHELL///////////etc/passwd"
o User-Agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:126.0) Gecko/20100101
Firefox/126.0"
3. IP: 192.168.1.100
o Timestamp: 06/Jun/2024:15:13:01 +0000
o Request: GET / HTTP/1.1
o Response: 404 (Not Found)
o User-Agent: "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML,
like Gecko) Chrome/90.0.4430.93 Safari/537.36"
Description: This request resulted in a 404 error, indicating the requested resource was
not found on the server. This could be a legitimate user error or a part of reconnaissance
activities.
4. IP: 203.160.68.13
o Timestamp: 06/Jun/2024:15:14:02 +0000
o Request: POST /clients/MyCRL HTTP/1.1
o Response: 403 (Forbidden)
o Request Body: "aCSHELL/////////etc/shadow"
o User-Agent: "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:126.0) Gecko/20100101
Firefox/126.0"
Description: Similar to the previous attack, this POST request attempts to access the
/etc/shadow file, which contains encrypted passwords. The server responded with a 403
Forbidden status, indicating that the request was blocked, which is a positive security
response.
5. IP: 203.160.68.12
o Timestamp: 06/Jun/2024:15:15:01 +0000
o Request: POST / HTTP/1.1
o Response: 200 (OK)
o User-Agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:126.0) Gecko/20100101
Firefox/126.0"
Description: This POST request to the root endpoint / returned a 200 OK response. The
absence of a specific resource path suggests a possible probe or attempt to interact with
the server without a clear objective. The consistent use of the same user-agent string
across requests might indicate automation or script usage.
The observed activities from IP addresses 203.160.68.12 and 203.160.68.13 raise significant
security concerns, particularly the attempt to exploit potential vulnerabilities in the server. The
successful response to directory traversal attacks suggests a lack of sufficient security controls,
such as input validation and proper sanitization.
Endpoint Security
To conduct a thorough analysis, I entered the attacker's IP address into our monitoring system to review
the associated data. The investigation covered several critical areas, including Processes, Network
Actions, Terminal History, and Browser History.
Based on our detection and analysis, the server has been secured and containment measures have been
implemented to prevent further unauthorized access.
Conclusion
Overview: The security incident involved multiple malicious activities, primarily targeting the server at
IP address 172.16.20.146. The attacks originated from the external IP address 203.160.68.12, which has
been associated with various malicious behaviors, including brute force attempts and directory traversal
attacks.
Key Findings:
Action Taken:
• Containment: Immediate containment measures were implemented to secure the affected server
and prevent further unauthorized access.
• Mitigation: Enhanced monitoring and logging mechanisms have been activated to track and
respond to any additional suspicious activities.
Recommendations:
• Patch Management: Apply the latest security patches, particularly for vulnerabilities like CVE-
2024-24919.
• Security Posture Review: Conduct a comprehensive review of security controls and policies to
strengthen defenses against similar attacks.
• Continuous Monitoring: Maintain vigilant monitoring of network traffic and server logs to
detect and respond to future threats promptly.