First published: Tue Sep 10 2024(Updated: )
An OS command injection vulnerability in Ivanti Cloud Services Appliance versions 4.6 Patch 518 and before allows a remote authenticated attacker to obtain remote code execution. The attacker must have admin level privileges to exploit this vulnerability.
Credit: 3c1d8aa1-5a33-4ea4-8992-aadd6440af75 3c1d8aa1-5a33-4ea4-8992-aadd6440af75
Affected Software | Affected Version | How to fix |
---|---|---|
Ivanti Cloud Service Appliances | ||
Ivanti Cloud Service Appliances | =4.6 | |
Ivanti Cloud Service Appliances | =4.6-patch_518 |
As Ivanti CSA has reached End-of-Life status, users are urged to remove CSA 4.6.x from service or upgrade to the 5.0.x line of supported solutions, as future vulnerabilities on the 4.6.x version of CSA are unlikely to receive future security updates.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-8190 is classified as a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2024-8190, update the Ivanti Cloud Services Appliance to version 4.6 Patch 519 or later.
Only remote authenticated attackers with admin level privileges can exploit the CVE-2024-8190 vulnerability.
CVE-2024-8190 allows attackers to execute arbitrary commands on the affected systems, leading to potential system compromise.
Ivanti Cloud Services Appliance versions 4.6 Patch 518 and earlier are affected by CVE-2024-8190.