CVE-2024-52885

The Mobile Access Portal's File Share application is vulnerable to a directory traversal attack, allowing an authenticated, malicious end-user (authorized to at least one File Share application) to list the file names of 'nobody'-accessible directories on the Mobile Access gateway.
References
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:checkpoint:mobile_access:-:*:*:*:*:*:*:*
cpe:2.3:a:checkpoint:remote_access_vpn:-:*:*:*:*:*:*:*
OR cpe:2.3:o:checkpoint:gaia_os:r81.10:*:*:*:*:*:*:*
cpe:2.3:o:checkpoint:gaia_os:r81.20:*:*:*:*:*:*:*
cpe:2.3:o:checkpoint:gaia_os:r82:*:*:*:*:*:*:*

History

27 Aug 2025, 14:21

Type Values Removed Values Added
References () https://support.checkpoint.com/results/sk/sk183137 - () https://support.checkpoint.com/results/sk/sk183137 - Vendor Advisory
Summary
  • (es) La aplicación Mobile Access Portal's File Share es vulnerable a un ataque de directory traversal, lo que permite que un usuario final malintencionado y autenticado (autorizado a al menos una aplicación File Share) enumere los nombres de archivos de directorios a los que "nadie" puede acceder en el portal de acceso móvil.
First Time Checkpoint gaia Os
Checkpoint remote Access Vpn
Checkpoint mobile Access
Checkpoint
CPE cpe:2.3:a:checkpoint:mobile_access:-:*:*:*:*:*:*:*
cpe:2.3:o:checkpoint:gaia_os:r81.10:*:*:*:*:*:*:*
cpe:2.3:a:checkpoint:remote_access_vpn:-:*:*:*:*:*:*:*
cpe:2.3:o:checkpoint:gaia_os:r81.20:*:*:*:*:*:*:*
cpe:2.3:o:checkpoint:gaia_os:r82:*:*:*:*:*:*:*
CWE CWE-22

06 Aug 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-06 15:15

Updated : 2025-08-27 14:21


NVD link : CVE-2024-52885

Mitre link : CVE-2024-52885

CVE.ORG link : CVE-2024-52885


JSON object : View

Products Affected

checkpoint

  • gaia_os
  • remote_access_vpn
  • mobile_access
CWE
CWE-35

Path Traversal: '.../...//'

CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')