First published: Wed Nov 13 2024(Updated: )
Argument injection in Ivanti Connect Secure before version 22.7R2.1 and 9.1R18.9 and Ivanti Policy Secure before version 22.7R1.1 and 9.1R18.9 allows a remote authenticated attacker with admin privileges to achieve remote code execution.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ivanti Connect Secure (ICS) VPN | <22.7R2.1<9.1R18.9 | |
Ivanti Policy Secure | <22.7R1.1<9.1R18.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-38655 is considered a critical vulnerability due to its potential for remote code execution.
To fix CVE-2024-38655, upgrade Ivanti Connect Secure to version 22.7R2.1 or 9.1R18.9, and Ivanti Policy Secure to version 22.7R1.1 or 9.1R18.9.
CVE-2024-38655 impacts remote authenticated users with admin privileges on vulnerable versions of Ivanti Connect Secure and Ivanti Policy Secure.
CVE-2024-38655 is classified as an argument injection vulnerability allowing remote code execution.
Yes, CVE-2024-38655 can be exploited remotely by an authenticated attacker with administrative access.