CVE-2024-37404
Scores
EPSS
Percentile: 84.1%
CVSS
CVSS Score: 8.8/10
All CVSS Scores
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vector Breakdown
CVSS (Common Vulnerability Scoring System) vector provides detailed metrics about vulnerability characteristics
CVSS
Attack Vector
Network (N)
Describes how the vulnerability is exploited
Attack Complexity
Low (L)
Describes the conditions beyond the attacker's control
Privileges Required
Low (L)
Describes the level of privileges an attacker must possess
User Interaction
None (N)
Captures the requirement for a human user participation
Scope
Unchanged (U)
Determines if a successful attack impacts components beyond the vulnerable component
Confidentiality Impact
High (H)
Measures the impact to the confidentiality of information
Integrity Impact
High (H)
Measures the impact to integrity of a successfully exploited vulnerability
Availability Impact
High (H)
Measures the impact to the availability of the impacted component
Description
Improper Input Validation in the admin portal of Ivanti Connect Secure before 22.7R2.1 and 9.1R18.9, or Ivanti Policy Secure before 22.7R1.1 allows a remote authenticated attacker to achieve remote code execution.
Scaner-VS 7 — a modern vulnerability management solution
Sources
Related Vulnerabilities
Vulnerable Software (4)
Type: Configuration
Operating System:
{ "children": [ { "cpe_match": [ { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*", "versionEndExcluding": "22.7r2.1", "versionStartIncl...
{ "children": [ { "cpe_match": [ { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*", "versionEndExcluding": "22.7r2.1", "versionStartIncluding": "10" }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*", "versionEndExcluding": "9.1r18.9" } ], "negate": false, "operator": "OR" } ], "operator": "OR"}
Source: anchore_overrides
Type: Configuration
Operating System:
{ "children": [ { "cpe_match": [ { "cpe23uri": "cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:*", "versionEndExcluding": "22.7r1.1" } ], "neg...
{ "children": [ { "cpe_match": [ { "cpe23uri": "cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:*", "versionEndExcluding": "22.7r1.1" } ], "negate": false, "operator": "OR" } ], "operator": "OR"}
Source: anchore_overrides
Type: Configuration
Vendor: *
Product: connect_secure
Operating System: * * *
{ "cpe_match": [ { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*", "versionEndExcluding": "9.1", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:iva...
{ "cpe_match": [ { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*", "versionEndExcluding": "9.1", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*", "versionEndExcluding": "22.7", "versionStartIncluding": "22.3", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r1:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r10:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r10.2:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r11:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r11.0:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r11.1:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r11.3:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r11.4:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r11.5:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r12:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r12.1:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r12.2:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r13:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r13.1:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r14:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r14.4:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r15:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r15.2:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r16:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r16.1:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r17:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r17.1:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r17.2:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r18:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r18.1:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r18.2:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r18.3:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r18.7:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r18.8:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r2:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r3:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r4:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r4.1:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r4.2:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r4.3:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r5:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r6:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r7:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r8:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r8.1:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r8.2:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r8.4:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r9:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r9.1:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r9.2:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:22.7:-:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:22.7:r1:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.1:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.2:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.3:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.4:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.5:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:22.7:r2:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.1:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:*", "versionEndExcluding": "22.7", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:policy_secure:22.7:-:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:policy_secure:22.7:r1:*:*:*:*:*:*", "vulnerable": true } ], "operator": "OR"}
Source: nvd
Type: Configuration
Vendor: *
Product: policy_secure
Operating System: * * *
{ "cpe_match": [ { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*", "versionEndExcluding": "9.1", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:iva...
{ "cpe_match": [ { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*", "versionEndExcluding": "9.1", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*", "versionEndExcluding": "22.7", "versionStartIncluding": "22.3", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r1:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r10:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r10.2:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r11:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r11.0:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r11.1:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r11.3:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r11.4:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r11.5:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r12:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r12.1:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r12.2:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r13:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r13.1:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r14:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r14.4:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r15:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r15.2:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r16:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r16.1:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r17:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r17.1:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r17.2:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r18:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r18.1:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r18.2:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r18.3:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r18.7:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r18.8:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r2:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r3:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r4:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r4.1:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r4.2:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r4.3:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r5:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r6:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r7:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r8:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r8.1:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r8.2:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r8.4:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r9:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r9.1:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:9.1:r9.2:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:22.7:-:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:22.7:r1:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.1:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.2:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.3:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.4:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.5:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:22.7:r2:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.1:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:*", "versionEndExcluding": "22.7", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:policy_secure:22.7:-:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:ivanti:policy_secure:22.7:r1:*:*:*:*:*:*", "vulnerable": true } ], "operator": "OR"}
Source: nvd