First published: Wed Nov 13 2024(Updated: )
Argument injection in Ivanti Connect Secure before version 22.7R2.1 and 9.1R18.7 and Ivanti Policy Secure before version 22.7R1.1 and 9.1R18.7 allows a remote authenticated attacker with admin privileges to achieve remote code execution.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ivanti Connect Secure (ICS) VPN | <22.7R2.1<9.1R18.7 | |
Ivanti Policy Secure | <22.7R1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39712 has a critical severity rating due to its potential for remote code execution by authenticated attackers.
To fix CVE-2024-39712, upgrade Ivanti Connect Secure to version 22.7R2.1 or 9.1R18.7 and Ivanti Policy Secure to version 22.7R1.1 or 9.1R18.7.
Affected versions include Ivanti Connect Secure versions before 22.7R2.1 and 9.1R18.7, as well as Ivanti Policy Secure versions before 22.7R1.1 and 9.1R18.7.
Yes, CVE-2024-39712 can be exploited remotely by an authenticated attacker with admin privileges.
CVE-2024-39712 is classified as an argument injection vulnerability allowing for potential remote code execution.