First published: Thu Apr 04 2024(Updated: )
An XML entity expansion or XEE vulnerability in SAML component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure allows an unauthenticated attacker to send specially crafted XML requests in-order-to temporarily cause resource exhaustion thereby resulting in a limited-time DoS.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ivanti Connect Secure (ICS) VPN | =9.1-r1 | |
Ivanti Connect Secure (ICS) VPN | =9.1-r10 | |
Ivanti Connect Secure (ICS) VPN | =9.1-r11 | |
Ivanti Connect Secure (ICS) VPN | =9.1-r11.5 | |
Ivanti Connect Secure (ICS) VPN | =9.1-r12 | |
Ivanti Connect Secure (ICS) VPN | =9.1-r13 | |
Ivanti Connect Secure (ICS) VPN | =9.1-r14 | |
Ivanti Connect Secure (ICS) VPN | =9.1-r15 | |
Ivanti Connect Secure (ICS) VPN | =9.1-r16 | |
Ivanti Connect Secure (ICS) VPN | =9.1-r17 | |
Ivanti Connect Secure (ICS) VPN | =9.1-r18 | |
Ivanti Connect Secure (ICS) VPN | =9.1-r2 | |
Ivanti Connect Secure (ICS) VPN | =9.1-r3 | |
Ivanti Connect Secure (ICS) VPN | =9.1-r4 | |
Ivanti Connect Secure (ICS) VPN | =9.1-r4.1 | |
Ivanti Connect Secure (ICS) VPN | =9.1-r4.2 | |
Ivanti Connect Secure (ICS) VPN | =9.1-r4.3 | |
Ivanti Connect Secure (ICS) VPN | =9.1-r5 | |
Ivanti Connect Secure (ICS) VPN | =9.1-r6 | |
Ivanti Connect Secure (ICS) VPN | =9.1-r7 | |
Ivanti Connect Secure (ICS) VPN | =9.1-r8 | |
Ivanti Connect Secure (ICS) VPN | =9.1-r9 | |
Ivanti Connect Secure (ICS) VPN | =22.1 | |
Ivanti Connect Secure (ICS) VPN | =22.2 | |
Ivanti Connect Secure (ICS) VPN | =22.3 | |
Ivanti Connect Secure (ICS) VPN | =22.4 | |
Ivanti Connect Secure (ICS) VPN | =22.5 | |
Ivanti Connect Secure (ICS) VPN | =22.6 | |
Pulse Policy Secure | =9.0 | |
Pulse Policy Secure | =9.0-r1 | |
Pulse Policy Secure | =9.0-r2 | |
Pulse Policy Secure | =9.0-r2.1 | |
Pulse Policy Secure | =9.0-r3 | |
Pulse Policy Secure | =9.0-r3.1 | |
Pulse Policy Secure | =9.0-r4 | |
Pulse Policy Secure | =9.1 | |
Pulse Policy Secure | =9.1-r1 | |
Pulse Policy Secure | =9.1-r10 | |
Pulse Policy Secure | =9.1-r11 | |
Pulse Policy Secure | =9.1-r12 | |
Pulse Policy Secure | =9.1-r13 | |
Pulse Policy Secure | =9.1-r14 | |
Pulse Policy Secure | =9.1-r15 | |
Pulse Policy Secure | =9.1-r16 | |
Pulse Policy Secure | =9.1-r17 | |
Pulse Policy Secure | =9.1-r18 | |
Pulse Policy Secure | =9.1-r2 | |
Pulse Policy Secure | =9.1-r3 | |
Pulse Policy Secure | =9.1-r4 | |
Pulse Policy Secure | =9.1-r5 | |
Pulse Policy Secure | =9.1-r6 | |
Pulse Policy Secure | =9.1-r7 | |
Pulse Policy Secure | =9.1-r8 | |
Pulse Policy Secure | =9.1-r9 | |
Pulse Policy Secure | =22.1 | |
Pulse Policy Secure | =22.2 | |
Pulse Policy Secure | =22.3 | |
Pulse Policy Secure | =22.4 | |
Pulse Policy Secure | =22.5 | |
Pulse Policy Secure | =22.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-22023 has a severity rating that indicates a potential for temporary resource exhaustion and a limited Denial of Service (DoS) for affected systems.
To address CVE-2024-22023, it is recommended that users apply the latest security patches provided by Ivanti for affected versions of Connect Secure and Policy Secure.
CVE-2024-22023 affects Ivanti Connect Secure versions 9.x and 22.x, as well as Ivanti Policy Secure versions 9.x and 22.x.
Yes, an unauthenticated attacker can exploit CVE-2024-22023 remotely by sending specially crafted XML requests.
CVE-2024-22023 is associated with XML Entity Expansion (XEE) attacks that can lead to resource exhaustion.