“Based on these customer alerts and Check Point’s analysis, the teams identified within 24 hours several potential customers who were subject to similar efforts,” added Check Point.
Check Point’s affected areas include CloudGuard Network, Quantum Maestro, Quantum Scalable Chassis, Quantum Security Gateways, and Quantum Spark Appliances.
Security Gateway Hotfix
To fix the vulnerable configuration in the affected gateway services, the company released a “hotfix update.” The update can be accessed on the Security Gateway portal under available software updates.
“Within hours of this development, Check Point released an easy-to-use solution that prevents attempts to exploit this vulnerability,” the company said in a release.
Alternatively, the hotfix is available separately as a download as part of the security advisory. Check Point urged customers to apply the fix to prevent unauthorized remote access attempts immediately.
In addition to applying the hotfix, the company suggested changing the password for the Security Gateway account in Active Directory and preventing local accounts from connecting to the VPN by validating the password.
Source link