First published: Thu Dec 14 2023(Updated: )
A vulnerability exists on all versions of Ivanti Connect Secure below 22.6R2 where an attacker with a foothold on an Ivanti Connect Secure (ICS) appliance can escalate their privileges by exploiting a vulnerable installed application. This vulnerability allows the attacker to gain elevated execution privileges on the affected system.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ivanti Pulse Connect Secure | =22.1-r1 | |
Ivanti Pulse Connect Secure | =22.1-r6 | |
Ivanti Pulse Connect Secure | =22.2 | |
Ivanti Pulse Connect Secure | =22.2-r1 | |
Ivanti Pulse Connect Secure | =22.3-r1 | |
Ivanti Pulse Connect Secure | =22.4-r1 | |
Ivanti Pulse Connect Secure | =22.4-r2.1 | |
Ivanti Pulse Connect Secure | =22.4-r2.2 | |
Ivanti Pulse Connect Secure | =22.5-r1.1 | |
Ivanti Pulse Connect Secure | =22.5-r2.1 | |
Ivanti Pulse Connect Secure | =22.6 | |
Ivanti Pulse Connect Secure | =22.6-r1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-41720 is a high severity vulnerability that allows privilege escalation on Ivanti Connect Secure appliances.
To fix CVE-2023-41720, upgrade Ivanti Connect Secure to version 22.6R2 or later as specified by Ivanti's security patch.
CVE-2023-41720 affects all versions of Ivanti Connect Secure below 22.6R2.
CVE-2023-41720 requires an attacker to have a foothold on the Ivanti Connect Secure appliance for exploitation.
CVE-2023-41720 is classified as a privilege escalation vulnerability.