First published: Wed Jan 31 2024(Updated: )
A server-side request forgery vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) and Ivanti Neurons for ZTA allows an attacker to access certain restricted resources without authentication.
Credit: support@hackerone.com support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ivanti Connect Secure, Policy Secure, and Neurons | ||
=9.0 | ||
=9.0-r1 | ||
=9.0-r2 | ||
=9.0-r2.1 | ||
=9.0-r3 | ||
=9.0-r3.1 | ||
=9.0-r3.2 | ||
=9.0-r3.3 | ||
=9.0-r3.5 | ||
=9.0-r4 | ||
=9.0-r4.1 | ||
=9.0-r5.0 | ||
=9.0-r6.0 | ||
=9.1-r1 | ||
=9.1-r10 | ||
=9.1-r11 | ||
=9.1-r11.3 | ||
=9.1-r11.4 | ||
=9.1-r11.5 | ||
=9.1-r12 | ||
=9.1-r12.1 | ||
=9.1-r13 | ||
=9.1-r13.1 | ||
=9.1-r14 | ||
=9.1-r15 | ||
=9.1-r15.2 | ||
=9.1-r16 | ||
=9.1-r16.1 | ||
=9.1-r17 | ||
=9.1-r17.1 | ||
=9.1-r18 | ||
=9.1-r18.1 | ||
=9.1-r18.2 | ||
=9.1-r2 | ||
=9.1-r3 | ||
=9.1-r4 | ||
=9.1-r4.1 | ||
=9.1-r4.2 | ||
=9.1-r4.3 | ||
=9.1-r5 | ||
=9.1-r6 | ||
=9.1-r7 | ||
=9.1-r8 | ||
=9.1-r8.1 | ||
=9.1-r8.2 | ||
=9.1-r9 | ||
=9.1-r9.1 | ||
=21.9-r1 | ||
=21.12-r1 | ||
=22.1-r1 | ||
=22.1-r6 | ||
=22.2 | ||
=22.2-r1 | ||
=22.3-r1 | ||
=22.4-r1 | ||
=22.4-r2.1 | ||
=22.6 | ||
=22.6-r1 | ||
=22.6-r2 | ||
=22.6-r2.1 | ||
=9.0 | ||
=9.0-r1 | ||
=9.0-r2 | ||
=9.0-r2.1 | ||
=9.0-r3 | ||
=9.0-r3.1 | ||
=9.0-r4 | ||
=9.1 | ||
=9.1-r1 | ||
=9.1-r10 | ||
=9.1-r11 | ||
=9.1-r12 | ||
=9.1-r13 | ||
=9.1-r13.1 | ||
=9.1-r14 | ||
=9.1-r15 | ||
=9.1-r16 | ||
=9.1-r17 | ||
=9.1-r18 | ||
=9.1-r18.1 | ||
=9.1-r18.2 | ||
=9.1-r2 | ||
=9.1-r3 | ||
=9.1-r3.1 | ||
=9.1-r4 | ||
=9.1-r4.1 | ||
=9.1-r4.2 | ||
=9.1-r4.3 | ||
=9.1-r5 | ||
=9.1-r6 | ||
=9.1-r7 | ||
=9.1-r8 | ||
=9.1-r8.1 | ||
=9.1-r8.2 | ||
=9.1-r9 | ||
=22.1-r1 | ||
=22.1-r6 | ||
=22.2-r1 | ||
=22.2-r3 | ||
=22.3-r1 | ||
=22.3-r3 | ||
=22.4-r1 | ||
=22.4-r2 | ||
=22.4-r2.1 | ||
=22.5-r1 | ||
=22.6-r1 |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)