Vulnerabilites related to Ivant - ICS
CVE-2024-22024 (GCVE-0-2024-22024)
Vulnerability from cvelistv5
Published
2024-02-13 04:07
Modified
2025-05-09 18:26
Severity ?
VLAI Severity ?
EPSS score ?
Summary
An XML external entity or XXE vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x), Ivanti Policy Secure (9.x, 22.x) and ZTA gateways which allows an attacker to access certain restricted resources without authentication.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
► | Ivanti | ICS |
Version: 9.1R14.5 ≤ Version: 9.1R17.3 ≤ Version: 9.1R18.4 ≤ Version: 22.1R6.1 ≤ Version: 22.2R4.1 ≤ Version: 22.3R1.1 ≤ Version: 22.4R1.1 ≤ Version: 22.5R1.2 ≤ Version: 22.6R1.1 ≤ Version: 22.4R2.3 ≤ Version: 22.5R2.3 ≤ Version: 22.6R2.2 ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:35:34.846Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://forums.ivanti.com/s/article/CVE-2024-22024-XXE-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure?language=en_US" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-22024", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-16T19:34:58.517182Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "CWE-611 Improper Restriction of XML External Entity Reference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-09T18:26:09.386Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "ICS", "vendor": "Ivanti", "versions": [ { "lessThan": "9.1R14.5", "status": "affected", "version": "9.1R14.5", "versionType": "semver" }, { "lessThan": "9.1R17.3", "status": "affected", "version": "9.1R17.3", "versionType": "semver" }, { "lessThan": "9.1R18.4", "status": "affected", "version": "9.1R18.4", "versionType": "semver" }, { "lessThan": "22.1R6.1", "status": "affected", "version": "22.1R6.1", "versionType": "semver" }, { "lessThan": "9.1R14.4", "status": "unaffected", "version": "9.1R14.4", "versionType": "semver" }, { "lessThan": "9.1R15.2", "status": "unaffected", "version": "9.1R15.2", "versionType": "semver" }, { "lessThan": "9.1R16.2", "status": "unaffected", "version": "9.1R16.2", "versionType": "semver" }, { "lessThan": "9.1R17.2", "status": "unaffected", "version": "9.1R17.2", "versionType": "semver" }, { "lessThan": "9.1R18.3", "status": "unaffected", "version": "9.1R18.3", "versionType": "semver" }, { "lessThan": "22.1R6.1", "status": "unaffected", "version": "22.1R6.1", "versionType": "semver" }, { "lessThan": "22.2R4.1", "status": "affected", "version": "22.2R4.1", "versionType": "semver" }, { "lessThan": "22.3R1.1", "status": "affected", "version": "22.3R1.1", "versionType": "semver" }, { "lessThan": "22.4R1.1", "status": "affected", "version": "22.4R1.1", "versionType": "semver" }, { "lessThan": "22.5R1.2", "status": "affected", "version": "22.5R1.2", "versionType": "semver" }, { "lessThan": "22.6R1.1", "status": "affected", "version": "22.6R1.1", "versionType": "semver" }, { "lessThan": "22.4R2.3", "status": "affected", "version": "22.4R2.3", "versionType": "semver" }, { "lessThan": "22.5R2.3", "status": "affected", "version": "22.5R2.3", "versionType": "semver" }, { "lessThan": "22.6R2.2", "status": "affected", "version": "22.6R2.2", "versionType": "semver" }, { "lessThan": "22.2R4.1", "status": "unaffected", "version": "22.2R4.1", "versionType": "semver" }, { "lessThan": "22.3R1", "status": "unaffected", "version": "22.3R1", "versionType": "semver" }, { "lessThan": "22.4R1.1", "status": "unaffected", "version": "22.4R1.1", "versionType": "semver" }, { "lessThan": "22.5R1.1", "status": "unaffected", "version": "22.5R1.1", "versionType": "semver" }, { "lessThan": "22.6R1.1", "status": "unaffected", "version": "22.6R1.1", "versionType": "semver" }, { "lessThan": "22.4R2.2", "status": "unaffected", "version": "22.4R2.2", "versionType": "semver" }, { "lessThan": "22.5R2.2", "status": "unaffected", "version": "22.5R2.2", "versionType": "semver" }, { "lessThan": "22.6R2.2", "status": "unaffected", "version": "22.6R2.2", "versionType": "semver" } ] }, { "product": "ICS", "vendor": "Ivant ", "versions": [ { "lessThan": "9.1R15.3", "status": "affected", "version": "9.1R15.3", "versionType": "semver" } ] }, { "product": "IPS", "vendor": "Ivanti", "versions": [ { "lessThan": "9.1R18.4", "status": "affected", "version": "9.1R18.4", "versionType": "semver" }, { "lessThan": "9.1R17.3", "status": "affected", "version": "9.1R17.3", "versionType": "semver" }, { "lessThan": "22.5R1.2", "status": "affected", "version": "22.5R1.2", "versionType": "semver" }, { "lessThan": "9.1R18.2", "status": "unaffected", "version": "9.1R18.2", "versionType": "semver" }, { "lessThan": "9.1R17.2", "status": "unaffected", "version": "9.1R17.2", "versionType": "semver" }, { "lessThan": "22.5R1.1", "status": "unaffected", "version": "22.5R1.1", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An XML external entity or XXE vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x), Ivanti Policy Secure (9.x, 22.x) and ZTA gateways which allows an attacker to access certain restricted resources without authentication." } ], "metrics": [ { "cvssV3_0": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.0" } } ], "providerMetadata": { "dateUpdated": "2024-02-13T04:07:04.355Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://forums.ivanti.com/s/article/CVE-2024-22024-XXE-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure?language=en_US" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2024-22024", "datePublished": "2024-02-13T04:07:04.355Z", "dateReserved": "2024-01-04T01:04:06.574Z", "dateUpdated": "2025-05-09T18:26:09.386Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }