Lucene search

K
saintSAINT CorporationSAINT:023354DDA8BBB4879D8A5440380C03C9
HistoryFeb 05, 2024 - 12:00 a.m.

Ivanti Connect Secure Server-Side Request Forgery

2024-02-0500:00:00
SAINT Corporation
download.saintcorporation.com
108
ivanti connect secure
saml component
vulnerability
remote access vpn
patch
privilege escalation
linux
exploit

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

19.3%

Added: 02/05/2024

Background

Ivanti Connect Secure is a web-based remote access VPN.

Problem

A server-side request forgery vulnerability in the SAML component allows attackers to access restricted resources without authentication. This can lead to remote command execution when chained with other vulnerabilities.

Resolution

Apply the appropriate patch referenced in the Ivanti Security Advisory.

References

<https://forums.ivanti.com/s/article/CVE-2024-21888-Privilege-Escalation-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure&gt;

Platforms

Linux

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

19.3%