Lucene search

K
saintSAINT CorporationSAINT:44512A21413975FC3A5BC8290C582BF4
HistoryFeb 05, 2024 - 12:00 a.m.

Ivanti Connect Secure Server-Side Request Forgery

2024-02-0500:00:00
SAINT Corporation
my.saintcorporation.com
66
ivanti connect secure
saml
vulnerability
unauthenticated access
remote command execution
linux
patch
security advisory

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.6

Confidence

Low

EPSS

0.001

Percentile

19.3%

Added: 02/05/2024

Background

Ivanti Connect Secure is a web-based remote access VPN.

Problem

A server-side request forgery vulnerability in the SAML component allows attackers to access restricted resources without authentication. This can lead to remote command execution when chained with other vulnerabilities.

Resolution

Apply the appropriate patch referenced in the Ivanti Security Advisory.

References

<https://forums.ivanti.com/s/article/CVE-2024-21888-Privilege-Escalation-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure&gt;

Platforms

Linux

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.6

Confidence

Low

EPSS

0.001

Percentile

19.3%