Argument injection in Ivanti Connect Secure before version 22.7R2.1 and 9.1R18.7 and Ivanti Policy Secure before version 22.7R1.1 allows a remote authenticated attacker with admin privileges to achieve remote code execution.
Metrics
Affected Vendors & Products
References
History
Sun, 01 Dec 2024 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Argument injection in Ivanti Connect Secure before version 22.7R2.1 and 9.1R18.7 and Ivanti Policy Secure before version 22.7R1.1 and 9.1R18.7 allows a remote authenticated attacker with admin privileges to achieve remote code execution. | Argument injection in Ivanti Connect Secure before version 22.7R2.1 and 9.1R18.7 and Ivanti Policy Secure before version 22.7R1.1 allows a remote authenticated attacker with admin privileges to achieve remote code execution. |
Sat, 23 Nov 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Argument injection in Ivanti Connect Secure before version 22.7R2 and 9.1R18.7 and Ivanti Policy Secure before version 22.7R1.1 allows a remote authenticated attacker with admin privileges to achieve remote code execution. | Argument injection in Ivanti Connect Secure before version 22.7R2.1 and 9.1R18.7 and Ivanti Policy Secure before version 22.7R1.1 and 9.1R18.7 allows a remote authenticated attacker with admin privileges to achieve remote code execution. |
Wed, 13 Nov 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Ivanti
Ivanti connect Secure Ivanti policy Secure |
|
Weaknesses | CWE-88 | |
CPEs | cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:* cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Ivanti
Ivanti connect Secure Ivanti policy Secure |
|
Metrics |
ssvc
|
Wed, 13 Nov 2024 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Argument injection in Ivanti Connect Secure before version 22.7R2 and 9.1R18.7 and Ivanti Policy Secure before version 22.7R1.1 allows a remote authenticated attacker with admin privileges to achieve remote code execution. | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-12-01T18:25:55.773Z
Reserved: 2024-06-28T01:04:08.820Z
Link: CVE-2024-39710

Updated: 2024-11-13T17:13:33.453Z

Status : Awaiting Analysis
Published: 2024-11-13T02:15:19.150
Modified: 2024-12-01T19:15:04.667
Link: CVE-2024-39710

No data.