{"uuid": "d82e641f-e90f-451d-a13e-2aa4eecf8343", "vulnerability": {"vulnId": "CVE-2024-9380", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "d82e641f-e90f-451d-a13e-2aa4eecf8343"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2024-10-09T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2024-10-09T00:00:00Z", "recorded_at": "2026-02-02T12:25:39Z", "first_seen_at": "2024-10-09T00:00:00Z"}, "scope": {"notes": "KEV entry: Ivanti Cloud Services Appliance (CSA) OS Command Injection Vulnerability | Affected: Ivanti / Cloud Services Appliance (CSA) | Description: Ivanti Cloud Services Appliance (CSA) contains an OS command injection vulnerability in the administrative console which can allow an authenticated attacker with application admin privileges to pass commands to the underlying OS. | Required action: As Ivanti CSA 4.6.x has reached End-of-Life status, users are urged to remove CSA 4.6.x from service or upgrade to the 5.0.x line, or later, of supported solution. | Due date: 2024-10-30 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-Cloud-Services-Appliance-CVE-2024-9379-CVE-2024-9380-CVE-2024-9381 ; https://nvd.nist.gov/vuln/detail/CVE-2024-9380"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-77"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Cloud Services Appliance (CSA)", "due_date": "2024-10-30", "date_added": "2024-10-09", "vendorProject": "Ivanti", "vulnerabilityName": "Ivanti Cloud Services Appliance (CSA) OS Command Injection Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2024-9380", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2024-9380"}]}
