
Test Level is caution of a zero-day vulnerability in its Community Safety gateway merchandise that danger actors have exploited within the wild.
Tracked as CVE-2024-24919, the problem affects CloudGuard Community, Quantum Maestro, Quantum Scalable Chassis, Quantum Safety Gateways, and Quantum Spark home equipment.
“The vulnerability probably permits an attacker to learn sure data on Web-connected Gateways with distant entry VPN or cell entry enabled,” Test Level stated.

Hotfixes are to be had within the following variations –
- Quantum Safety Gateway and CloudGuard Community Safety Variations – R81.20, R81.10, R81, R80.40
- Quantum Maestro and Quantum Scalable Chassis – R81.20, R81.10, R80.40, R80.30SP, R80.20SP
- Quantum Spark Gateways Model – R81.10.x, R80.20.x, R77.20.x
The improvement comes days after the Israeli cybersecurity corporate warned of assaults focused on its VPN gadgets to infiltrate undertaking networks.
“Via Would possibly 24, 2024, we known a small choice of login makes an attempt the usage of previous VPN local-accounts depending on unrecommended password-only authentication approach,” it famous previous this week.
This has now been traced again to a brand new high-severity zero-day came upon in Safety Gateways with IPSec VPN, Faraway Get admission to VPN and the Cell Get admission to tool blade.

Test Level didn’t elaborate at the nature of the assaults, however famous in an FAQ that the exploitation makes an attempt seen to this point focal point on “distant entry on previous native accounts with unrecommended password-only authentication” towards a “small choice of shoppers.”

The focused on of VPN gadgets represents simply the most recent sequence of assaults to focus on community perimeter packages, with an identical assaults impacting gadgets from Barracuda Networks, Cisco, Fortinet, Ivanti, Palo Alto Networks, and VMware in recent times.
“Attackers are motivated to achieve entry to organizations over remote-access setups so they may be able to attempt to uncover related undertaking belongings and customers, in the hunt for for vulnerabilities in an effort to achieve endurance on key undertaking belongings,” Test Level stated.