All the vulnerabilites related to Ivanti - Policy Secure
cve-2024-22023
Vulnerability from cvelistv5
Published
2024-04-04 19:45
Modified
2024-10-03 21:38
Severity ?
EPSS score ?
Summary
An XML entity expansion or XEE vulnerability in SAML component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure allows an unauthenticated attacker to send specially crafted XML requests in-order-to temporarily cause resource exhaustion thereby resulting in a limited-time DoS.
Impacted products
▼ | Vendor | Product |
---|---|---|
Ivanti | Connect Secure | |
Ivanti | Policy Secure |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "connect_secure", "vendor": "ivanti", "versions": [ { "status": "affected", "version": "9.1R18.5" }, { "status": "affected", "version": "22.6R2.3" }, { "status": "affected", "version": "9.1R17.4" }, { "status": "affected", "version": "22.2R3" }, { "status": "affected", "version": "22.5R2.4" }, { "status": "affected", "version": "9.1R14.6" }, { "status": "affected", "version": "9.1R15.4" }, { "status": "affected", "version": "22.2R4.2" }, { "status": "affected", "version": "22.4R1.2" }, { "status": "affected", "version": "22.6R1.2" }, { "status": "affected", "version": "22.1R6.2" }, { "status": "affected", "version": "22.3R1.2" }, { "status": "affected", "version": "22.4R2.4" }, { "status": "affected", "version": "22.5R1.3" } ] }, { "cpes": [ "cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "policy_secure", "vendor": "ivanti", "versions": [ { "status": "affected", "version": "22.4R1.2" }, { "status": "affected", "version": "22.5R1.3" }, { "status": "affected", "version": "22.6R1.2" }, { "status": "affected", "version": "9.1R16.4" }, { "status": "affected", "version": "9.1R17.4" }, { "status": "affected", "version": "9.1R18.5" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-22023", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-05T13:19:01.057408Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-703", "description": "CWE-703 Improper Check or Handling of Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-03T21:38:58.416Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T22:35:34.713Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://forums.ivanti.com/s/article/New-CVE-2024-21894-Heap-Overflow-CVE-2024-22052-Null-Pointer-Dereference-CVE-2024-22053-Heap-Overflow-and-CVE-2024-22023-XML-entity-expansion-or-XXE-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Connect Secure", "vendor": "Ivanti", "versions": [ { "lessThan": "22.1R6.2", "status": "affected", "version": "22.1R6.2", "versionType": "semver" }, { "lessThan": "22.2R4.2", "status": "affected", "version": "22.2R4.2", "versionType": "semver" }, { "lessThan": "22.3R1.2", "status": "affected", "version": "22.3R1.2", "versionType": "semver" }, { "lessThan": "22.4R1.2", "status": "affected", "version": "22.4R1.2", "versionType": "semver" }, { "lessThan": "22.4R2.4", "status": "affected", "version": "22.4R2.4", "versionType": "semver" }, { "lessThan": "22.5R1.3", "status": "affected", "version": "22.5R1.3", "versionType": "semver" }, { "lessThan": "22.5R2.4", "status": "affected", "version": "22.5R2.4", "versionType": "semver" }, { "lessThan": "22.6R2.3", "status": "affected", "version": "22.6R2.3", "versionType": "semver" }, { "lessThan": "9.1R14.6", "status": "affected", "version": "9.1R14.6", "versionType": "semver" }, { "lessThan": "9.1R15.4", "status": "affected", "version": "9.1R15.4", "versionType": "semver" }, { "lessThan": "9.1R16.4", "status": "affected", "version": "9.1R16.4", "versionType": "semver" }, { "lessThan": "9.1R17.4", "status": "affected", "version": "9.1R17.4", "versionType": "semver" }, { "lessThan": "9.1R18.5", "status": "affected", "version": "9.1R18.5", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "Policy Secure", "vendor": "Ivanti", "versions": [ { "lessThan": "22.4R1.2", "status": "affected", "version": "22.4R1.2", "versionType": "semver" }, { "lessThan": "22.5R1.3", "status": "affected", "version": "22.5R1.3", "versionType": "semver" }, { "lessThan": "22.6R1.2", "status": "affected", "version": "22.6R1.2", "versionType": "semver" }, { "lessThan": "9.1R16.4", "status": "affected", "version": "9.1R16.4", "versionType": "semver" }, { "lessThan": "9.1R17.4", "status": "affected", "version": "9.1R17.4", "versionType": "semver" }, { "lessThan": "9.1R18.5", "status": "affected", "version": "9.1R18.5", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An XML entity expansion or XEE vulnerability in SAML component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure allows an unauthenticated attacker to send specially crafted XML requests in-order-to temporarily cause resource exhaustion thereby resulting in a limited-time DoS. " } ], "metrics": [ { "cvssV3_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-04-04T19:45:10.162Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://forums.ivanti.com/s/article/New-CVE-2024-21894-Heap-Overflow-CVE-2024-22052-Null-Pointer-Dereference-CVE-2024-22053-Heap-Overflow-and-CVE-2024-22023-XML-entity-expansion-or-XXE-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-22023", "datePublished": "2024-04-04T19:45:10.162Z", "dateReserved": "2024-01-04T01:04:06.574Z", "dateUpdated": "2024-10-03T21:38:58.416Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-38656
Vulnerability from cvelistv5
Published
2024-11-13 01:54
Modified
2024-11-13 18:18
Severity ?
EPSS score ?
Summary
Argument injection in Ivanti Connect Secure before version 22.7R2.2 and 9.1R18.9 and Ivanti Policy Secure before version 22.7R1.2 allows a remote authenticated attacker with admin privileges to achieve remote code execution.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Ivanti | Connect Secure | |
Ivanti | Policy Secure |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:ivanti:connect_secure:-:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "connect_secure", "vendor": "ivanti", "versions": [ { "lessThan": "22.7R2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:ivanti:connect_secure:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "connect_secure", "vendor": "ivanti", "versions": [ { "lessThan": "9.1R18.9", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:ivanti:automation:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "automation", "vendor": "ivanti", "versions": [ { "lessThan": "22.7R1.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-38656", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-13T18:16:15.635327Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-88", "description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-13T18:18:30.102Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Connect Secure", "vendor": "Ivanti", "versions": [ { "lessThan": "22.7R2.2", "status": "affected", "version": "22.7R2.2", "versionType": "custom" }, { "lessThan": "9.1R18.9", "status": "affected", "version": "9.1R18.9", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Policy Secure", "vendor": "Ivanti", "versions": [ { "lessThan": "22.7R1.2", "status": "affected", "version": "22.7R1.2", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Argument injection in Ivanti Connect Secure before version 22.7R2.2 and 9.1R18.9 and Ivanti Policy Secure before version 22.7R1.2 allows a remote authenticated attacker with admin privileges to achieve remote code execution." } ], "metrics": [ { "cvssV3_0": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-11-13T01:54:45.445Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-38656", "datePublished": "2024-11-13T01:54:45.445Z", "dateReserved": "2024-06-19T01:04:07.138Z", "dateUpdated": "2024-11-13T18:18:30.102Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-47905
Vulnerability from cvelistv5
Published
2024-11-12 15:56
Modified
2024-11-12 18:35
Severity ?
EPSS score ?
Summary
A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.3 and Ivanti Policy Secure before version 22.7R1.2 allows a remote authenticated attacker with admin privileges to cause a denial of service.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Ivanti | Connect Secure | |
Ivanti | Policy Secure |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-47905", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-12T18:35:29.588357Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-12T18:35:42.210Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Connect Secure", "vendor": "Ivanti", "versions": [ { "status": "unaffected", "version": "22.7R2.3", "versionType": "custom" } ] }, { "defaultStatus": "affected", "product": "Policy Secure", "vendor": "Ivanti", "versions": [ { "status": "unaffected", "version": "22.7R1.2", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.3 and Ivanti Policy Secure before version 22.7R1.2 allows a remote authenticated attacker with admin privileges to cause a denial of service.\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;\u003c/span\u003e" } ], "value": "A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.3 and Ivanti Policy Secure before version 22.7R1.2 allows a remote authenticated attacker with admin privileges to cause a denial of service." } ], "impacts": [ { "capecId": "CAPEC-100", "descriptions": [ { "lang": "en", "value": "CAPEC-100 Overflow Buffers" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "CWE-121: Stack-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-12T15:56:13.827Z", "orgId": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "shortName": "ivanti" }, "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "assignerShortName": "ivanti", "cveId": "CVE-2024-47905", "datePublished": "2024-11-12T15:56:13.827Z", "dateReserved": "2024-10-04T19:25:07.889Z", "dateUpdated": "2024-11-12T18:35:42.210Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-21894
Vulnerability from cvelistv5
Published
2024-04-04 22:16
Modified
2024-10-03 21:43
Severity ?
EPSS score ?
Summary
A heap overflow vulnerability in IPSec component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure allows an unauthenticated malicious user to send specially crafted requests in-order-to crash the service thereby causing a DoS attack. In certain conditions this may lead to execution of arbitrary code
Impacted products
▼ | Vendor | Product |
---|---|---|
Ivanti | Connect Secure | |
Ivanti | Policy Secure |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "connect_secure", "vendor": "ivanti", "versions": [ { "status": "affected", "version": "22.1R6.2" }, { "status": "affected", "version": "22.2R4.2" }, { "status": "affected", "version": "22.3R1.2" }, { "status": "affected", "version": "22.4R1.2" }, { "status": "affected", "version": "22.4R2.4" }, { "status": "affected", "version": "22.5R1.3" }, { "status": "affected", "version": "22.5R2.4" }, { "status": "affected", "version": "22.6R2.3" }, { "status": "affected", "version": "9.1R14.6" }, { "status": "affected", "version": "9.1R15.4" }, { "status": "affected", "version": "9.1R16.4" }, { "status": "affected", "version": "9.1R17.4" }, { "status": "affected", "version": "9.1R18.5" } ] }, { "cpes": [ "cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "policy_secure", "vendor": "ivanti", "versions": [ { "status": "affected", "version": "22.4R1.2" }, { "status": "affected", "version": "22.6R1.2" }, { "status": "affected", "version": "9.1R16.4" }, { "status": "affected", "version": "9.1R17.4" }, { "status": "affected", "version": "9.1R18.5" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-21894", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-05T16:37:42.930659Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-703", "description": "CWE-703 Improper Check or Handling of Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-03T21:43:40.315Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T22:35:33.424Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://forums.ivanti.com/s/article/SA-CVE-2024-21894-Heap-Overflow-CVE-2024-22052-Null-Pointer-Dereference-CVE-2024-22053-Heap-Overflow-and-CVE-2024-22023-XML-entity-expansion-or-XXE-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Connect Secure", "vendor": "Ivanti", "versions": [ { "lessThan": "22.1R6.2", "status": "affected", "version": "22.1R6.2", "versionType": "semver" }, { "lessThan": "22.2R4.2", "status": "affected", "version": "22.2R4.2", "versionType": "semver" }, { "lessThan": "22.3R1.2", "status": "affected", "version": "22.3R1.2", "versionType": "semver" }, { "lessThan": "22.4R1.2", "status": "affected", "version": "22.4R1.2", "versionType": "semver" }, { "lessThan": "22.4R2.4", "status": "affected", "version": "22.4R2.4", "versionType": "semver" }, { "lessThan": "22.5R1.3", "status": "affected", "version": "22.5R1.3", "versionType": "semver" }, { "lessThan": "22.5R2.4", "status": "affected", "version": "22.5R2.4", "versionType": "semver" }, { "lessThan": "22.6R2.3", "status": "affected", "version": "22.6R2.3", "versionType": "semver" }, { "lessThan": "9.1R14.6", "status": "affected", "version": "9.1R14.6", "versionType": "semver" }, { "lessThan": "9.1R15.4", "status": "affected", "version": "9.1R15.4", "versionType": "semver" }, { "lessThan": "9.1R16.4", "status": "affected", "version": "9.1R16.4", "versionType": "semver" }, { "lessThan": "9.1R17.4", "status": "affected", "version": "9.1R17.4", "versionType": "semver" }, { "lessThan": "9.1R18.5", "status": "affected", "version": "9.1R18.5", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "Policy Secure", "vendor": "Ivanti", "versions": [ { "lessThan": "22.4R1.2", "status": "affected", "version": "22.4R1.2", "versionType": "semver" }, { "lessThan": "22.6R1.2", "status": "affected", "version": "22.6R1.2", "versionType": "semver" }, { "lessThan": "9.1R16.4", "status": "affected", "version": "9.1R16.4", "versionType": "semver" }, { "lessThan": "9.1R17.4", "status": "affected", "version": "9.1R17.4", "versionType": "semver" }, { "lessThan": "9.1R18.5", "status": "affected", "version": "9.1R18.5", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A heap overflow vulnerability in IPSec component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure allows an unauthenticated malicious user to send specially crafted requests in-order-to crash the service thereby causing a DoS attack. In certain conditions this may lead to execution of arbitrary code " } ], "metrics": [ { "cvssV3_0": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-04-04T22:16:29.330Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://forums.ivanti.com/s/article/SA-CVE-2024-21894-Heap-Overflow-CVE-2024-22052-Null-Pointer-Dereference-CVE-2024-22053-Heap-Overflow-and-CVE-2024-22023-XML-entity-expansion-or-XXE-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-21894", "datePublished": "2024-04-04T22:16:29.330Z", "dateReserved": "2024-01-03T01:04:06.539Z", "dateUpdated": "2024-10-03T21:43:40.315Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-39711
Vulnerability from cvelistv5
Published
2024-11-13 01:54
Modified
2024-11-13 17:16
Severity ?
EPSS score ?
Summary
Argument injection in Ivanti Connect Secure before version 22.7R2.1 and 9.1R18.7 and Ivanti Policy Secure before version 22.7R1.1 allows a remote authenticated attacker with admin privileges to achieve remote code execution.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Ivanti | Connect Secure | |
Ivanti | Policy Secure |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "connect_secure", "vendor": "ivanti", "versions": [ { "lessThan": "22.7_r2.3", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "9.1_r18.7", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "policy_secure", "vendor": "ivanti", "versions": [ { "lessThan": "22.7_r1.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-39711", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-13T17:16:14.381365Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-88", "description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-13T17:16:37.401Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Connect Secure", "vendor": "Ivanti", "versions": [ { "lessThan": "22.7R2.1", "status": "affected", "version": "22.7R2.1", "versionType": "custom" }, { "lessThan": "9.1R18.7", "status": "affected", "version": "9.1R18.7", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Policy Secure", "vendor": "Ivanti", "versions": [ { "lessThan": "22.7R1.1", "status": "affected", "version": "22.7R1.1", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Argument injection in Ivanti Connect Secure before version 22.7R2.1 and 9.1R18.7 and Ivanti Policy Secure before version 22.7R1.1 allows a remote authenticated attacker with admin privileges to achieve remote code execution." } ], "metrics": [ { "cvssV3_0": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-11-13T01:54:45.452Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-39711", "datePublished": "2024-11-13T01:54:45.452Z", "dateReserved": "2024-06-28T01:04:08.821Z", "dateUpdated": "2024-11-13T17:16:37.401Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-29205
Vulnerability from cvelistv5
Published
2024-04-24 23:12
Modified
2024-10-03 21:30
Severity ?
EPSS score ?
Summary
An Improper Check for Unusual or Exceptional Conditions vulnerability in the web component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows a remote unauthenticated attacker to send specially crafted requests in-order-to cause service disruptions.
Impacted products
▼ | Vendor | Product |
---|---|---|
Ivanti | Connect Secure | |
Ivanti | Connect Secure | |
Ivanti | Policy Secure |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "connect_secure", "vendor": "ivanti", "versions": [ { "status": "affected", "version": "9.1R18.5" }, { "status": "affected", "version": "22.6R2.3" }, { "status": "affected", "version": "9.1R17.4" }, { "status": "affected", "version": "22.2R3" }, { "status": "affected", "version": "22.5R2.4" }, { "status": "affected", "version": "9.1R14.6" }, { "status": "affected", "version": "9.1R15.4" }, { "status": "affected", "version": "22.2R4.2" }, { "status": "affected", "version": "22.4R1.2" }, { "status": "affected", "version": "22.6R1.2" }, { "status": "affected", "version": "22.1R6.2" }, { "status": "affected", "version": "22.3R1.2" }, { "status": "affected", "version": "22.4R2.4" }, { "status": "affected", "version": "22.5R1.3" } ] }, { "cpes": [ "cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "policy_secure", "vendor": "ivanti", "versions": [ { "status": "affected", "version": "22.5R1.3" }, { "status": "affected", "version": "9.1R18.5" }, { "status": "affected", "version": "9.1R17.4" }, { "status": "affected", "version": "22.2R3" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-29205", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-20T14:41:02.374802Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-703", "description": "CWE-703 Improper Check or Handling of Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-03T21:30:48.706Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:10:54.619Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://forums.ivanti.com/s/article/SA-CVE-2024-21894-Heap-Overflow-CVE-2024-22052-Null-Pointer-Dereference-CVE-2024-22053-Heap-Overflow-and-CVE-2024-22023-XML-entity-expansion-or-XXE-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Connect Secure", "vendor": "Ivanti", "versions": [ { "lessThan": "9.1R18.5", "status": "affected", "version": "9.1R18.5", "versionType": "semver" }, { "lessThan": "22.6R2.3", "status": "affected", "version": "22.6R2.3", "versionType": "semver" }, { "lessThan": "9.1R17.4", "status": "affected", "version": "9.1R17.4", "versionType": "semver" }, { "lessThan": "22.2R3", "status": "affected", "version": "22.2R3", "versionType": "semver" }, { "lessThan": "22.5R2.4", "status": "affected", "version": "22.5R2.4", "versionType": "semver" }, { "lessThan": "9.1R14.6", "status": "affected", "version": "9.1R14.6", "versionType": "semver" }, { "lessThan": "9.1R16.4", "status": "affected", "version": "9.1R16.4", "versionType": "semver" }, { "lessThan": "9.1R15.4", "status": "affected", "version": "9.1R15.4", "versionType": "semver" }, { "lessThan": "22.2R4.2", "status": "affected", "version": "22.2R4.2", "versionType": "semver" }, { "lessThan": "22.4R1.2", "status": "affected", "version": "22.4R1.2", "versionType": "semver" }, { "lessThan": "22.6R1.2", "status": "affected", "version": "22.6R1.2", "versionType": "semver" }, { "lessThan": "22.1R6.2", "status": "affected", "version": "22.1R6.2", "versionType": "semver" }, { "lessThan": "22.3R1.2", "status": "affected", "version": "22.3R1.2", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "Connect Secure", "vendor": "Ivanti ", "versions": [ { "lessThan": "22.4R2.4", "status": "affected", "version": "22.4R2.4", "versionType": "semver" }, { "lessThan": "22.5R1.3", "status": "affected", "version": "22.5R1.3", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "Policy Secure", "vendor": "Ivanti", "versions": [ { "lessThan": "22.5R1.3", "status": "affected", "version": "22.5R1.3", "versionType": "semver" }, { "lessThan": "9.1R18.5", "status": "affected", "version": "9.1R18.5", "versionType": "semver" }, { "lessThan": "9.1R17.4", "status": "affected", "version": "9.1R17.4", "versionType": "semver" }, { "lessThan": "22.2R3", "status": "affected", "version": "22.2R3", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An Improper Check for Unusual or Exceptional Conditions vulnerability in the web component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows a remote unauthenticated attacker to send specially crafted requests in-order-to cause service disruptions." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-04-24T23:12:51.923Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://forums.ivanti.com/s/article/SA-CVE-2024-21894-Heap-Overflow-CVE-2024-22052-Null-Pointer-Dereference-CVE-2024-22053-Heap-Overflow-and-CVE-2024-22023-XML-entity-expansion-or-XXE-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-29205", "datePublished": "2024-04-24T23:12:51.923Z", "dateReserved": "2024-03-19T01:04:06.323Z", "dateUpdated": "2024-10-03T21:30:48.706Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-11005
Vulnerability from cvelistv5
Published
2024-11-12 16:07
Modified
2024-11-12 18:30
Severity ?
EPSS score ?
Summary
Command injection in Ivanti Connect Secure before version 22.7R2.1 and Ivanti Policy Secure before version 22.7R1.1 allows a remote authenticated attacker with admin privileges to achieve remote code execution.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Ivanti | Connect Secure | |
Ivanti | Policy Secure |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:ivanti:connect_secure:-:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "connect_secure", "vendor": "ivanti", "versions": [ { "status": "affected", "version": "22.7R2.1" } ] }, { "cpes": [ "cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "policy_secure", "vendor": "ivanti", "versions": [ { "status": "affected", "version": "22.7R1.1" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-11005", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-12T18:29:40.876421Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-12T18:30:35.957Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Connect Secure", "vendor": "Ivanti", "versions": [ { "status": "unaffected", "version": "22.7R2.1", "versionType": "custom" } ] }, { "defaultStatus": "affected", "product": "Policy Secure", "vendor": "Ivanti", "versions": [ { "status": "unaffected", "version": "22.7R1.1", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eCommand injection in Ivanti Connect Secure before version 22.7R2.1 and Ivanti Policy Secure before version 22.7R1.1 allows a remote authenticated attacker with admin privileges to achieve remote code execution.\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;\u003c/span\u003e" } ], "value": "Command injection in Ivanti Connect Secure before version 22.7R2.1 and Ivanti Policy Secure before version 22.7R1.1 allows a remote authenticated attacker with admin privileges to achieve remote code execution." } ], "impacts": [ { "capecId": "CAPEC-248", "descriptions": [ { "lang": "en", "value": "CAPEC-248 Command Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-12T16:07:45.350Z", "orgId": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "shortName": "ivanti" }, "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "assignerShortName": "ivanti", "cveId": "CVE-2024-11005", "datePublished": "2024-11-12T16:07:45.350Z", "dateReserved": "2024-11-07T21:56:05.756Z", "dateUpdated": "2024-11-12T18:30:35.957Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-47909
Vulnerability from cvelistv5
Published
2024-11-12 16:02
Modified
2024-11-12 16:02
Severity ?
EPSS score ?
Summary
A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.3 and Ivanti Policy Secure before version 22.7R1.2 allows a remote authenticated attacker with admin privileges to cause a denial of service.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Ivanti | Connect Secure | |
Ivanti | Policy Secure |
{ "containers": { "cna": { "affected": [ { "defaultStatus": "affected", "product": "Connect Secure", "vendor": "Ivanti", "versions": [ { "status": "unaffected", "version": "22.7R2.3", "versionType": "custom" } ] }, { "defaultStatus": "affected", "product": "Policy Secure", "vendor": "Ivanti", "versions": [ { "status": "unaffected", "version": "22.7R1.2", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.3 and Ivanti Policy Secure before version 22.7R1.2 allows a remote authenticated attacker with admin privileges to cause a denial of service.\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;\u003c/span\u003e" } ], "value": "A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.3 and Ivanti Policy Secure before version 22.7R1.2 allows a remote authenticated attacker with admin privileges to cause a denial of service." } ], "impacts": [ { "capecId": "CAPEC-100", "descriptions": [ { "lang": "en", "value": "CAPEC-100 Overflow Buffers" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "CWE-121: Stack-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-12T16:02:28.451Z", "orgId": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "shortName": "ivanti" }, "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "assignerShortName": "ivanti", "cveId": "CVE-2024-47909", "datePublished": "2024-11-12T16:02:28.451Z", "dateReserved": "2024-10-04T19:25:07.890Z", "dateUpdated": "2024-11-12T16:02:28.451Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-22053
Vulnerability from cvelistv5
Published
2024-04-04 19:45
Modified
2024-10-03 21:40
Severity ?
EPSS score ?
Summary
A heap overflow vulnerability in IPSec component of Ivanti Connect Secure (9.x
22.x) and Ivanti Policy Secure allows an unauthenticated malicious user to send specially crafted requests in-order-to crash the service thereby causing a DoS attack or in certain conditions read contents from memory.
Impacted products
▼ | Vendor | Product |
---|---|---|
Ivanti | Connect Secure | |
Ivanti | Policy Secure |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "connect_secure", "vendor": "ivanti", "versions": [ { "status": "affected", "version": "9.1R18.5" }, { "status": "affected", "version": "22.6R2.3" }, { "status": "affected", "version": "9.1R17.4" }, { "status": "affected", "version": "22.2R3" }, { "status": "affected", "version": "22.5R2.4" }, { "status": "affected", "version": "9.1R14.6" }, { "status": "affected", "version": "9.1R15.4" }, { "status": "affected", "version": "22.2R4.2" }, { "status": "affected", "version": "22.4R1.2" }, { "status": "affected", "version": "22.6R1.2" }, { "status": "affected", "version": "22.1R6.2" }, { "status": "affected", "version": "22.3R1.2" }, { "status": "affected", "version": "22.4R2.4" }, { "status": "affected", "version": "22.5R1.3" } ] }, { "cpes": [ "cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "policy_secure", "vendor": "ivanti", "versions": [ { "status": "affected", "version": "22.5R1.3" }, { "status": "affected", "version": "9.1R18.5" }, { "status": "affected", "version": "9.1R17.4" }, { "status": "affected", "version": "22.2R3" } ] }, { "cpes": [ "cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "connect_secure", "vendor": "ivanti", "versions": [ { "status": "affected", "version": "9.1R18.5" }, { "status": "affected", "version": "22.6R2.3" }, { "status": "affected", "version": "9.1R17.4" }, { "status": "affected", "version": "22.2R3" }, { "status": "affected", "version": "22.5R2.4" }, { "status": "affected", "version": "9.1R14.6" }, { "status": "affected", "version": "9.1R15.4" }, { "status": "affected", "version": "22.2R4.2" }, { "status": "affected", "version": "22.4R1.2" }, { "status": "affected", "version": "22.6R1.2" }, { "status": "affected", "version": "22.1R6.2" }, { "status": "affected", "version": "22.3R1.2" }, { "status": "affected", "version": "22.4R2.4" }, { "status": "affected", "version": "22.5R1.3" } ] }, { "cpes": [ "cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "policy_secure", "vendor": "ivanti", "versions": [ { "status": "affected", "version": "22.4R1.2" }, { "status": "affected", "version": "22.5R1.3" }, { "status": "affected", "version": "22.6R1.2" }, { "status": "affected", "version": "9.1R16.4" }, { "status": "affected", "version": "9.1R17.4" }, { "status": "affected", "version": "9.1R18.5" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-22053", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-04-05T15:29:40.880404Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-703", "description": "CWE-703 Improper Check or Handling of Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-03T21:40:00.903Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T22:35:34.816Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://forums.ivanti.com/s/article/New-CVE-2024-21894-Heap-Overflow-CVE-2024-22052-Null-Pointer-Dereference-CVE-2024-22053-Heap-Overflow-and-CVE-2024-22023-XML-entity-expansion-or-XXE-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Connect Secure", "vendor": "Ivanti", "versions": [ { "lessThan": "22.1R6.2", "status": "affected", "version": "22.1R6.2", "versionType": "semver" }, { "lessThan": "22.2R4.2", "status": "affected", "version": "22.2R4.2", "versionType": "semver" }, { "lessThan": "22.3R1.2", "status": "affected", "version": "22.3R1.2", "versionType": "semver" }, { "lessThan": "22.4R1.2", "status": "affected", "version": "22.4R1.2", "versionType": "semver" }, { "lessThan": "22.4R2.4", "status": "affected", "version": "22.4R2.4", "versionType": "semver" }, { "lessThan": "22.5R1.3", "status": "affected", "version": "22.5R1.3", "versionType": "semver" }, { "lessThan": "22.5R2.4", "status": "affected", "version": "22.5R2.4", "versionType": "semver" }, { "lessThan": "22.6R2.3", "status": "affected", "version": "22.6R2.3", "versionType": "semver" }, { "lessThan": "9.1R14.6", "status": "affected", "version": "9.1R14.6", "versionType": "semver" }, { "lessThan": "9.1R15.4", "status": "affected", "version": "9.1R15.4", "versionType": "semver" }, { "lessThan": "9.1R16.4", "status": "affected", "version": "9.1R16.4", "versionType": "semver" }, { "lessThan": "9.1R17.4", "status": "affected", "version": "9.1R17.4", "versionType": "semver" }, { "lessThan": "9.1R18.5", "status": "affected", "version": "9.1R18.5", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "Policy Secure", "vendor": "Ivanti", "versions": [ { "lessThan": "22.4R1.2", "status": "affected", "version": "22.4R1.2", "versionType": "semver" }, { "lessThan": "22.5R1.3", "status": "affected", "version": "22.5R1.3", "versionType": "semver" }, { "lessThan": "22.6R1.2", "status": "affected", "version": "22.6R1.2", "versionType": "semver" }, { "lessThan": "9.1R16.4", "status": "affected", "version": "9.1R16.4", "versionType": "semver" }, { "lessThan": "9.1R17.4", "status": "affected", "version": "9.1R17.4", "versionType": "semver" }, { "lessThan": "9.1R18.5", "status": "affected", "version": "9.1R18.5", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A heap overflow vulnerability in IPSec component of Ivanti Connect Secure (9.x\n 22.x) and Ivanti Policy Secure allows an unauthenticated malicious user to send specially crafted requests in-order-to crash the service thereby causing a DoS attack or in certain conditions read contents from memory. " } ], "metrics": [ { "cvssV3_0": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-04-04T19:45:10.175Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://forums.ivanti.com/s/article/New-CVE-2024-21894-Heap-Overflow-CVE-2024-22052-Null-Pointer-Dereference-CVE-2024-22053-Heap-Overflow-and-CVE-2024-22023-XML-entity-expansion-or-XXE-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-22053", "datePublished": "2024-04-04T19:45:10.175Z", "dateReserved": "2024-01-05T01:04:06.642Z", "dateUpdated": "2024-10-03T21:40:00.903Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-8495
Vulnerability from cvelistv5
Published
2024-11-12 16:04
Modified
2024-11-12 16:04
Severity ?
EPSS score ?
Summary
A null pointer dereference in Ivanti Connect Secure before version 22.7R2.1 and Ivanti Policy Secure before version 22.7R1.1 allows a remote unauthenticated attacker to cause a denial of service.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Ivanti | Connect Secure | |
Ivanti | Policy Secure |
{ "containers": { "cna": { "affected": [ { "defaultStatus": "affected", "product": "Connect Secure", "vendor": "Ivanti", "versions": [ { "status": "unaffected", "version": "22.7R2.1", "versionType": "custom" } ] }, { "defaultStatus": "affected", "product": "Policy Secure", "vendor": "Ivanti", "versions": [ { "status": "unaffected", "version": "22.7R1.1", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA null pointer dereference in Ivanti Connect Secure before version 22.7R2.1 and Ivanti Policy Secure before version 22.7R1.1 allows a remote unauthenticated attacker to cause a denial of service.\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;\u003c/span\u003e" } ], "value": "A null pointer dereference in Ivanti Connect Secure before version 22.7R2.1 and Ivanti Policy Secure before version 22.7R1.1 allows a remote unauthenticated attacker to cause a denial of service." } ], "impacts": [ { "capecId": "CAPEC-129", "descriptions": [ { "lang": "en", "value": "CAPEC-129 Pointer Manipulation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-12T16:04:41.257Z", "orgId": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "shortName": "ivanti" }, "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "assignerShortName": "ivanti", "cveId": "CVE-2024-8495", "datePublished": "2024-11-12T16:04:41.257Z", "dateReserved": "2024-09-05T18:16:58.816Z", "dateUpdated": "2024-11-12T16:04:41.257Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-37404
Vulnerability from cvelistv5
Published
2024-10-18 23:06
Modified
2024-10-21 17:22
Severity ?
EPSS score ?
Summary
Improper Input Validation in the admin portal of Ivanti Connect Secure before 22.7R2.1 and 9.1R18.9, or Ivanti Policy Secure before 22.7R1.1 allows a remote authenticated attacker to achieve remote code execution.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Ivanti | Connect Secure | |
Ivanti | Policy Secure |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "connect_secure", "vendor": "ivanti", "versions": [ { "lessThan": "22.7r2.1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "9.1r18.9", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "policy_secure", "vendor": "ivanti", "versions": [ { "lessThan": "22.7r1.1", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-37404", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-21T17:17:52.468911Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-21T17:22:47.072Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Connect Secure", "vendor": "Ivanti", "versions": [ { "lessThan": "22.7R2.1", "status": "affected", "version": "22.7R2.1", "versionType": "custom" }, { "lessThan": "9.1R18.9", "status": "affected", "version": "9.1R18.9", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Policy Secure", "vendor": "Ivanti", "versions": [ { "lessThan": "22.7R1.1", "status": "affected", "version": "22.7R1.1", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper Input Validation in the admin portal of Ivanti Connect Secure before 22.7R2.1 and 9.1R18.9, or Ivanti Policy Secure before 22.7R1.1 allows a remote authenticated attacker to achieve remote code execution." } ], "metrics": [ { "cvssV3_0": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-10-18T23:06:49.502Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-and-Policy-Secure-CVE-2024-37404" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-37404", "datePublished": "2024-10-18T23:06:49.502Z", "dateReserved": "2024-06-08T01:04:07.093Z", "dateUpdated": "2024-10-21T17:22:47.072Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-11006
Vulnerability from cvelistv5
Published
2024-11-12 16:06
Modified
2024-11-12 20:01
Severity ?
EPSS score ?
Summary
Command injection in Ivanti Connect Secure before version 22.7R2.1 and Ivanti Policy Secure before version 22.7R1.1 allows a remote authenticated attacker with admin privileges to achieve remote code execution.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Ivanti | Connect Secure | |
Ivanti | Policy Secure |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:ivanti:connect_secure:22.7r2.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "connect_secure", "vendor": "ivanti", "versions": [ { "status": "affected", "version": "22.7R2.1" } ] }, { "cpes": [ "cpe:2.3:a:ivanti:policy_secure:22.7r1.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "policy_secure", "vendor": "ivanti", "versions": [ { "status": "affected", "version": "22.7r1.1" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-11006", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-12T19:54:21.424345Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-12T20:01:11.315Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Connect Secure", "vendor": "Ivanti", "versions": [ { "status": "unaffected", "version": "22.7R2.1", "versionType": "custom" } ] }, { "defaultStatus": "affected", "product": "Policy Secure", "vendor": "Ivanti", "versions": [ { "status": "unaffected", "version": "22.7R1.1", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eCommand injection in Ivanti Connect Secure before version 22.7R2.1 and Ivanti Policy Secure before version 22.7R1.1 allows a remote authenticated attacker with admin privileges to achieve remote code execution.\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;\u003c/span\u003e" } ], "value": "Command injection in Ivanti Connect Secure before version 22.7R2.1 and Ivanti Policy Secure before version 22.7R1.1 allows a remote authenticated attacker with admin privileges to achieve remote code execution." } ], "impacts": [ { "capecId": "CAPEC-248", "descriptions": [ { "lang": "en", "value": "CAPEC-248 Command Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-12T16:06:16.240Z", "orgId": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "shortName": "ivanti" }, "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "assignerShortName": "ivanti", "cveId": "CVE-2024-11006", "datePublished": "2024-11-12T16:06:16.240Z", "dateReserved": "2024-11-07T21:56:06.635Z", "dateUpdated": "2024-11-12T20:01:11.315Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-39712
Vulnerability from cvelistv5
Published
2024-11-13 01:54
Modified
2024-11-13 15:39
Severity ?
EPSS score ?
Summary
Argument injection in Ivanti Connect Secure before version 22.7R2.1 and 9.1R18.7 and Ivanti Policy Secure before version 22.7R1.1 allows a remote authenticated attacker with admin privileges to achieve remote code execution.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Ivanti | Connect Secure | |
Ivanti | Policy Secure |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "connect_secure", "vendor": "ivanti", "versions": [ { "lessThan": "22.7_r2.3", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "9.1_r18.7", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "policy_secure", "vendor": "ivanti", "versions": [ { "lessThan": "22.7_r1.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-39712", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-13T15:38:11.593771Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-88", "description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-13T15:39:09.252Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Connect Secure", "vendor": "Ivanti", "versions": [ { "lessThan": "22.7R2.1", "status": "affected", "version": "22.7R2.1", "versionType": "custom" }, { "lessThan": "9.1R18.7", "status": "affected", "version": "9.1R18.7", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Policy Secure", "vendor": "Ivanti", "versions": [ { "lessThan": "22.7R1.1", "status": "affected", "version": "22.7R1.1", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Argument injection in Ivanti Connect Secure before version 22.7R2.1 and 9.1R18.7 and Ivanti Policy Secure before version 22.7R1.1 allows a remote authenticated attacker with admin privileges to achieve remote code execution." } ], "metrics": [ { "cvssV3_0": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-11-13T01:54:45.518Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-39712", "datePublished": "2024-11-13T01:54:45.518Z", "dateReserved": "2024-06-28T01:04:08.821Z", "dateUpdated": "2024-11-13T15:39:09.252Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-39710
Vulnerability from cvelistv5
Published
2024-11-13 01:54
Modified
2024-11-13 17:14
Severity ?
EPSS score ?
Summary
Argument injection in Ivanti Connect Secure before version 22.7R2 and 9.1R18.7 and Ivanti Policy Secure before version 22.7R1.1 allows a remote authenticated attacker with admin privileges to achieve remote code execution.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Ivanti | Connect Secure | |
Ivanti | Policy Secure |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "connect_secure", "vendor": "ivanti", "versions": [ { "lessThan": "22.7_r2.3", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "9.1_r18.7", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "policy_secure", "vendor": "ivanti", "versions": [ { "lessThan": "22.7_r1.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-39710", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-13T17:13:40.758458Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-88", "description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-13T17:14:55.844Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Connect Secure", "vendor": "Ivanti", "versions": [ { "lessThan": "22.7R2", "status": "affected", "version": "22.7R2", "versionType": "custom" }, { "lessThan": "9.1R18.7", "status": "affected", "version": "9.1R18.7", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Policy Secure", "vendor": "Ivanti", "versions": [ { "lessThan": "22.7R1.1", "status": "affected", "version": "22.7R1.1", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Argument injection in Ivanti Connect Secure before version 22.7R2 and 9.1R18.7 and Ivanti Policy Secure before version 22.7R1.1 allows a remote authenticated attacker with admin privileges to achieve remote code execution." } ], "metrics": [ { "cvssV3_0": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-11-13T01:54:45.384Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-39710", "datePublished": "2024-11-13T01:54:45.384Z", "dateReserved": "2024-06-28T01:04:08.820Z", "dateUpdated": "2024-11-13T17:14:55.844Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-11007
Vulnerability from cvelistv5
Published
2024-11-12 16:05
Modified
2024-11-12 16:05
Severity ?
EPSS score ?
Summary
Command injection in Ivanti Connect Secure before version 22.7R2.1 and Ivanti Policy Secure before version 22.7R1.1 allows a remote authenticated attacker with admin privileges to achieve remote code execution.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Ivanti | Connect Secure | |
Ivanti | Policy Secure |
{ "containers": { "cna": { "affected": [ { "defaultStatus": "affected", "product": "Connect Secure", "vendor": "Ivanti", "versions": [ { "status": "unaffected", "version": "22.7R2.1", "versionType": "custom" } ] }, { "defaultStatus": "affected", "product": "Policy Secure", "vendor": "Ivanti", "versions": [ { "status": "unaffected", "version": "22.7R1.1", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eCommand injection in Ivanti Connect Secure before version 22.7R2.1 and Ivanti Policy Secure before version 22.7R1.1 allows a remote authenticated attacker with admin privileges to achieve remote code execution.\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;\u003c/span\u003e" } ], "value": "Command injection in Ivanti Connect Secure before version 22.7R2.1 and Ivanti Policy Secure before version 22.7R1.1 allows a remote authenticated attacker with admin privileges to achieve remote code execution." } ], "impacts": [ { "capecId": "CAPEC-248", "descriptions": [ { "lang": "en", "value": "CAPEC-248 Command Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-12T16:05:26.487Z", "orgId": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "shortName": "ivanti" }, "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "assignerShortName": "ivanti", "cveId": "CVE-2024-11007", "datePublished": "2024-11-12T16:05:26.487Z", "dateReserved": "2024-11-07T21:56:07.508Z", "dateUpdated": "2024-11-12T16:05:26.487Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-39709
Vulnerability from cvelistv5
Published
2024-11-13 01:54
Modified
2024-11-13 18:15
Severity ?
EPSS score ?
Summary
Incorrect file permissions in Ivanti Connect Secure before version 22.6R2 and Ivanti Policy Secure before version 22.6R1 allow a local authenticated attacker to escalate their privileges.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Ivanti | Connect Secure | |
Ivanti | Policy Secure |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:ivanti:connect_secure:-:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "connect_secure", "vendor": "ivanti", "versions": [ { "lessThan": "22.6R2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "policy_secure", "vendor": "ivanti", "versions": [ { "lessThan": "22.6R1", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-39709", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-13T18:12:49.534551Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-732", "description": "CWE-732 Incorrect Permission Assignment for Critical Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-13T18:15:21.838Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Connect Secure", "vendor": "Ivanti", "versions": [ { "lessThan": "22.6R2", "status": "affected", "version": "22.6R2", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Policy Secure", "vendor": "Ivanti", "versions": [ { "lessThan": "22.6R1", "status": "affected", "version": "22.6R1", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Incorrect file permissions in Ivanti Connect Secure before version 22.6R2 and Ivanti Policy Secure before version 22.6R1 allow a local authenticated attacker to escalate their privileges." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-11-13T01:54:45.448Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-39709", "datePublished": "2024-11-13T01:54:45.448Z", "dateReserved": "2024-06-28T01:04:08.820Z", "dateUpdated": "2024-11-13T18:15:21.838Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-38655
Vulnerability from cvelistv5
Published
2024-11-13 01:54
Modified
2024-11-13 15:37
Severity ?
EPSS score ?
Summary
Argument injection in Ivanti Connect Secure before version 22.7R2.1 and Ivanti Policy Secure before version 22.7R1.1 allows a remote authenticated attacker with admin privileges to achieve remote code execution.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Ivanti | Connect Secure | |
Ivanti | Policy Secure |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "connect_secure", "vendor": "ivanti", "versions": [ { "lessThan": "22.7_r2.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "policy_secure", "vendor": "ivanti", "versions": [ { "lessThan": "22.7_r1.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-38655", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-13T15:36:18.124138Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-88", "description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-13T15:37:13.168Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Connect Secure", "vendor": "Ivanti", "versions": [ { "lessThan": "22.7R2.1", "status": "affected", "version": "22.7R2.1", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Policy Secure", "vendor": "Ivanti", "versions": [ { "lessThan": "22.7R1.1", "status": "affected", "version": "22.7R1.1", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Argument injection in Ivanti Connect Secure before version 22.7R2.1 and Ivanti Policy Secure before version 22.7R1.1 allows a remote authenticated attacker with admin privileges to achieve remote code execution." } ], "metrics": [ { "cvssV3_0": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-11-13T01:54:45.595Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-38655", "datePublished": "2024-11-13T01:54:45.595Z", "dateReserved": "2024-06-19T01:04:07.138Z", "dateUpdated": "2024-11-13T15:37:13.168Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-47906
Vulnerability from cvelistv5
Published
2024-11-12 15:59
Modified
2024-11-12 15:59
Severity ?
EPSS score ?
Summary
Excessive binary privileges in Ivanti Connect Secure which affects versions 22.4R2 through 22.7R2.2 inclusive within the R2 release line and Ivanti Policy Secure before version 22.7R1.2 allow a local authenticated attacker to escalate privileges.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Ivanti | Connect Secure | |
Ivanti | Policy Secure |
{ "containers": { "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Connect Secure", "vendor": "Ivanti", "versions": [ { "lessThanOrEqual": "22.7R2.2", "status": "affected", "version": "22.4R2", "versionType": "custom" }, { "status": "unaffected", "version": "22.7R2.3", "versionType": "custom" } ] }, { "defaultStatus": "affected", "product": "Policy Secure", "vendor": "Ivanti", "versions": [ { "status": "unaffected", "version": "22.7R1.2", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eExcessive binary privileges in Ivanti Connect Secure which affects versions 22.4R2 through 22.7R2.2 inclusive within the R2 release line and Ivanti Policy Secure before version 22.7R1.2 allow a local authenticated attacker to escalate privileges.\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;\u003c/span\u003e" } ], "value": "Excessive binary privileges in Ivanti Connect Secure which affects versions 22.4R2 through 22.7R2.2 inclusive within the R2 release line and Ivanti Policy Secure before version 22.7R1.2 allow a local authenticated attacker to escalate privileges." } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233 Privilege Escalation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-267", "description": "CWE-267: Privilege Defined With Unsafe Actions", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-426", "description": "CWE-426 Untrusted Search Path", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-12T15:59:53.269Z", "orgId": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "shortName": "ivanti" }, "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "assignerShortName": "ivanti", "cveId": "CVE-2024-47906", "datePublished": "2024-11-12T15:59:53.269Z", "dateReserved": "2024-10-04T19:25:07.889Z", "dateUpdated": "2024-11-12T15:59:53.269Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-22052
Vulnerability from cvelistv5
Published
2024-04-04 19:45
Modified
2024-10-03 21:40
Severity ?
EPSS score ?
Summary
A null pointer dereference vulnerability in IPSec component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure allows an unauthenticated malicious user to send specially crafted requests in-order-to crash the service thereby causing a DoS attack
Impacted products
▼ | Vendor | Product |
---|---|---|
Ivanti | Connect Secure | |
Ivanti | Policy Secure |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "connect_secure", "vendor": "ivanti", "versions": [ { "status": "affected", "version": "9.1R18.5" }, { "status": "affected", "version": "22.6R2.3" }, { "status": "affected", "version": "9.1R17.4" }, { "status": "affected", "version": "22.2R3" }, { "status": "affected", "version": "22.5R2.4" }, { "status": "affected", "version": "9.1R14.6" }, { "status": "affected", "version": "9.1R15.4" }, { "status": "affected", "version": "22.2R4.2" }, { "status": "affected", "version": "22.4R1.2" }, { "status": "affected", "version": "22.6R1.2" }, { "status": "affected", "version": "22.1R6.2" }, { "status": "affected", "version": "22.3R1.2" }, { "status": "affected", "version": "22.4R2.4" }, { "status": "affected", "version": "22.5R1.3" } ] }, { "cpes": [ "cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "policy_secure", "vendor": "ivanti", "versions": [ { "status": "affected", "version": "22.5R1.3" }, { "status": "affected", "version": "9.1R18.5" }, { "status": "affected", "version": "9.1R17.4" }, { "status": "affected", "version": "22.2R3" } ] }, { "cpes": [ "cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "connect_secure", "vendor": "ivanti", "versions": [ { "status": "affected", "version": "9.1R18.5" }, { "status": "affected", "version": "22.6R2.3" }, { "status": "affected", "version": "9.1R17.4" }, { "status": "affected", "version": "22.2R3" }, { "status": "affected", "version": "22.5R2.4" }, { "status": "affected", "version": "9.1R14.6" }, { "status": "affected", "version": "9.1R15.4" }, { "status": "affected", "version": "22.2R4.2" }, { "status": "affected", "version": "22.4R1.2" }, { "status": "affected", "version": "22.6R1.2" }, { "status": "affected", "version": "22.1R6.2" }, { "status": "affected", "version": "22.3R1.2" }, { "status": "affected", "version": "22.4R2.4" }, { "status": "affected", "version": "22.5R1.3" } ] }, { "cpes": [ "cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "policy_secure", "vendor": "ivanti", "versions": [ { "status": "affected", "version": "22.4R1.2" }, { "status": "affected", "version": "22.5R1.3" }, { "status": "affected", "version": "22.6R1.2" }, { "status": "affected", "version": "9.1R16.4" }, { "status": "affected", "version": "9.1R17.4" }, { "status": "affected", "version": "9.1R18.5" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-22052", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-05T17:35:12.496886Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-703", "description": "CWE-703 Improper Check or Handling of Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-03T21:40:23.298Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T22:35:34.818Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://forums.ivanti.com/s/article/New-CVE-2024-21894-Heap-Overflow-CVE-2024-22052-Null-Pointer-Dereference-CVE-2024-22053-Heap-Overflow-and-CVE-2024-22023-XML-entity-expansion-or-XXE-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Connect Secure", "vendor": "Ivanti", "versions": [ { "lessThan": "22.1R6.2", "status": "affected", "version": "22.1R6.2", "versionType": "semver" }, { "lessThan": "22.2R4.2", "status": "affected", "version": "22.2R4.2", "versionType": "semver" }, { "lessThan": "22.3R1.2", "status": "affected", "version": "22.3R1.2", "versionType": "semver" }, { "lessThan": "22.4R1.2", "status": "affected", "version": "22.4R1.2", "versionType": "semver" }, { "lessThan": "22.4R2.4", "status": "affected", "version": "22.4R2.4", "versionType": "semver" }, { "lessThan": "22.5R1.3", "status": "affected", "version": "22.5R1.3", "versionType": "semver" }, { "lessThan": "22.5R2.4", "status": "affected", "version": "22.5R2.4", "versionType": "semver" }, { "lessThan": "22.6R2.3", "status": "affected", "version": "22.6R2.3", "versionType": "semver" }, { "lessThan": "9.1R14.6", "status": "affected", "version": "9.1R14.6", "versionType": "semver" }, { "lessThan": "9.1R15.4", "status": "affected", "version": "9.1R15.4", "versionType": "semver" }, { "lessThan": "9.1R16.4", "status": "affected", "version": "9.1R16.4", "versionType": "semver" }, { "lessThan": "9.1R17.4", "status": "affected", "version": "9.1R17.4", "versionType": "semver" }, { "lessThan": "9.1R18.5", "status": "affected", "version": "9.1R18.5", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "Policy Secure", "vendor": "Ivanti", "versions": [ { "lessThan": "22.4R1.2", "status": "affected", "version": "22.4R1.2", "versionType": "semver" }, { "lessThan": "22.5R1.3", "status": "affected", "version": "22.5R1.3", "versionType": "semver" }, { "lessThan": "22.6R1.2", "status": "affected", "version": "22.6R1.2", "versionType": "semver" }, { "lessThan": "9.1R16.4", "status": "affected", "version": "9.1R16.4", "versionType": "semver" }, { "lessThan": "9.1R17.4", "status": "affected", "version": "9.1R17.4", "versionType": "semver" }, { "lessThan": "9.1R18.5", "status": "affected", "version": "9.1R18.5", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A null pointer dereference vulnerability in IPSec component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure allows an unauthenticated malicious user to send specially crafted requests in-order-to crash the service thereby causing a DoS attack " } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-04-04T19:45:10.169Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://forums.ivanti.com/s/article/New-CVE-2024-21894-Heap-Overflow-CVE-2024-22052-Null-Pointer-Dereference-CVE-2024-22053-Heap-Overflow-and-CVE-2024-22023-XML-entity-expansion-or-XXE-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-22052", "datePublished": "2024-04-04T19:45:10.169Z", "dateReserved": "2024-01-05T01:04:06.641Z", "dateUpdated": "2024-10-03T21:40:23.298Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-9420
Vulnerability from cvelistv5
Published
2024-11-12 15:57
Modified
2024-11-12 18:34
Severity ?
EPSS score ?
Summary
A use-after-free in Ivanti Connect Secure before version 22.7R2.3 and Ivanti Policy Secure before version 22.7R1.2 allows a remote authenticated attacker to achieve remote code execution.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Ivanti | Connect Secure | |
Ivanti | Policy Secure |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:ivanti:connect_secure:-:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "connect_secure", "vendor": "ivanti", "versions": [ { "status": "affected", "version": "22.7R2.3" } ] }, { "cpes": [ "cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "policy_secure", "vendor": "ivanti", "versions": [ { "status": "affected", "version": "22.7R1.2" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-9420", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-12T18:33:53.833009Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-12T18:34:50.452Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Connect Secure", "vendor": "Ivanti", "versions": [ { "status": "unaffected", "version": "22.7R2.3", "versionType": "custom" } ] }, { "defaultStatus": "affected", "product": "Policy Secure", "vendor": "Ivanti", "versions": [ { "status": "unaffected", "version": "22.7R1.2", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA use-after-free in Ivanti Connect Secure before version 22.7R2.3 and Ivanti Policy Secure before version 22.7R1.2 allows a remote authenticated attacker to achieve remote code execution.\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;\u003c/span\u003e" } ], "value": "A use-after-free in Ivanti Connect Secure before version 22.7R2.3 and Ivanti Policy Secure before version 22.7R1.2 allows a remote authenticated attacker to achieve remote code execution." } ], "impacts": [ { "capecId": "CAPEC-129", "descriptions": [ { "lang": "en", "value": "CAPEC-129 Pointer Manipulation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-12T15:57:24.947Z", "orgId": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "shortName": "ivanti" }, "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "assignerShortName": "ivanti", "cveId": "CVE-2024-9420", "datePublished": "2024-11-12T15:57:24.947Z", "dateReserved": "2024-10-01T20:04:39.852Z", "dateUpdated": "2024-11-12T18:34:50.452Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-11004
Vulnerability from cvelistv5
Published
2024-11-12 16:09
Modified
2024-11-12 18:28
Severity ?
EPSS score ?
Summary
Reflected XSS in Ivanti Connect Secure before version 22.7R2.1 and Ivanti Policy Secure before version 22.7R1.1 allows a remote unauthenticated attacker to obtain admin privileges. User interaction is required.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Ivanti | Connect Secure | |
Ivanti | Policy Secure |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:ivanti:connect_secure:-:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "connect_secure", "vendor": "ivanti", "versions": [ { "status": "affected", "version": "22.7R2.1" } ] }, { "cpes": [ "cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "policy_secure", "vendor": "ivanti", "versions": [ { "status": "affected", "version": "22.7R1.1" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-11004", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-12T18:27:42.282072Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-12T18:28:54.740Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Connect Secure", "vendor": "Ivanti", "versions": [ { "status": "unaffected", "version": "22.7R2.1", "versionType": "custom" } ] }, { "defaultStatus": "affected", "product": "Policy Secure", "vendor": "Ivanti", "versions": [ { "status": "unaffected", "version": "22.7R1.1", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eReflected XSS in Ivanti Connect Secure before version 22.7R2.1 and Ivanti Policy Secure before version 22.7R1.1 allows a remote unauthenticated attacker to obtain admin privileges. User interaction is required.\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;\u003c/span\u003e" } ], "value": "Reflected XSS in Ivanti Connect Secure before version 22.7R2.1 and Ivanti Policy Secure before version 22.7R1.1 allows a remote unauthenticated attacker to obtain admin privileges. User interaction is required." } ], "impacts": [ { "capecId": "CAPEC-591", "descriptions": [ { "lang": "en", "value": "CAPEC-591 Reflected XSS" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-12T16:09:33.164Z", "orgId": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "shortName": "ivanti" }, "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "assignerShortName": "ivanti", "cveId": "CVE-2024-11004", "datePublished": "2024-11-12T16:09:19.437Z", "dateReserved": "2024-11-07T21:56:04.757Z", "dateUpdated": "2024-11-12T18:28:54.740Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }