The Mobile Access Portal's File Share application is vulnerable to a directory traversal attack, allowing an authenticated, malicious end-user (authorized to at least one File Share application) to list the file names of 'nobody'-accessible directories on the Mobile Access gateway.

Project Subscriptions

Vendors Products
Checkpoint Subscribe
Check Point Subscribe
Gaia Os Subscribe
Mobile Access Subscribe
Mobile Access Portal Agent Subscribe
Remote Access Vpn Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2024-54849 The Mobile Access Portal's File Share application is vulnerable to a directory traversal attack, allowing an authenticated, malicious end-user (authorized to at least one File Share application) to list the file names of 'nobody'-accessible directories on the Mobile Access gateway.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 27 Aug 2025 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Checkpoint gaia Os
Checkpoint mobile Access
Checkpoint remote Access Vpn
Weaknesses CWE-22
CPEs cpe:2.3:a:checkpoint:mobile_access:-:*:*:*:*:*:*:*
cpe:2.3:a:checkpoint:remote_access_vpn:-:*:*:*:*:*:*:*
cpe:2.3:o:checkpoint:gaia_os:r81.10:*:*:*:*:*:*:*
cpe:2.3:o:checkpoint:gaia_os:r81.20:*:*:*:*:*:*:*
cpe:2.3:o:checkpoint:gaia_os:r82:*:*:*:*:*:*:*
Vendors & Products Checkpoint gaia Os
Checkpoint mobile Access
Checkpoint remote Access Vpn

Thu, 07 Aug 2025 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Checkpoint
Checkpoint check Point
Checkpoint mobile Access Portal Agent
Vendors & Products Checkpoint
Checkpoint check Point
Checkpoint mobile Access Portal Agent

Wed, 06 Aug 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 06 Aug 2025 15:00:00 +0000

Type Values Removed Values Added
Description The Mobile Access Portal's File Share application is vulnerable to a directory traversal attack, allowing an authenticated, malicious end-user (authorized to at least one File Share application) to list the file names of 'nobody'-accessible directories on the Mobile Access gateway.
Title Path Traversal
Weaknesses CWE-35
References
Metrics cvssV3_1

{'score': 5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: checkpoint

Published:

Updated: 2025-08-06T15:03:53.437Z

Reserved: 2024-11-17T08:00:07.201Z

Link: CVE-2024-52885

cve-icon Vulnrichment

Updated: 2025-08-06T15:02:49.052Z

cve-icon NVD

Status : Analyzed

Published: 2025-08-06T15:15:31.287

Modified: 2025-08-27T14:21:06.577

Link: CVE-2024-52885

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-08-07T22:09:58Z

Weaknesses