Ivanti released its December 2024 security advisory to address nine critical and high severity vulnerabilities in its products, such as Ivanti Connect Secure, Policy Secure, Cloud Services Application, and Sentry. Five of these nine vulnerabilities are rated as critical.
Ivanti mentioned in the advisory that there was no prior knowledge of any customers being exploited by these vulnerabilities before public disclosure.
CVE-2024-11639
The vulnerability has a critical severity rating with a CVSS score of 10. The authentication bypass vulnerability exists in the admin web console of the Ivanti Cloud Services Application. Successful exploitation of the vulnerability allows a remote, unauthenticated attacker to gain administrative access.
CVE-2024-11772
The vulnerability has a critical severity rating with a CVSS score of 9.1. The command injection vulnerability exists in the admin web console of the Ivanti Cloud Services Application. Successful exploitation of the vulnerability allows remote, authenticated attacker with admin privileges to perform remote code execution.
CVE-2024-11773
The vulnerability has a critical severity rating with a CVSS score of 9.1. The SQL injection vulnerability exists in the admin web console of the Ivanti Cloud Services Application. Successful exploitation of the vulnerability allows a remote, authenticated attacker with admin privileges to run arbitrary SQL statements.
CVE-2024-11633
The vulnerability has a critical severity rating with a CVSS score of 9.1. The argument injection vulnerability exists in Ivanti Connect Secure and Ivanti Policy Secure. Successful exploitation of the vulnerability allows a remote, authenticated attacker with admin privileges to perform remote code execution.
CVE-2024-11634
The vulnerability has a critical severity rating with a CVSS score of 9.1. The command injection vulnerability exists in Ivanti Connect Secure and Ivanti Policy Secure. Successful exploitation of the vulnerability allows a remote, authenticated attacker with admin privileges to achieve remote code execution.
CVE-2024-8540
The vulnerability has a high severity rating with a CVSS score of 8.8. The vulnerability originates from insecure permissions in Ivanti Sentry. Successful exploitation of the vulnerability allows a local, authenticated attacker to modify sensitive application components.
CVE-2024-37377
The vulnerability has a high severity rating with a CVSS score of 7.5. The heap-based buffer overflow vulnerability exists in the IPsec of Ivanti Connect Secure. Successful exploitation of the vulnerability allows a remote, unauthenticated attacker to cause a denial of service.
CVE-2024-37401
The vulnerability has a high severity rating with a CVSS score of 7.5. The out-of-bounds read vulnerability exists in the IPsec of Ivanti Connect Secure. Successful exploitation of the vulnerability allows a remote, unauthenticated attacker to cause a denial of service.
CVE-2024-9844
The vulnerability has a high severity rating with a CVSS score of 7.1. The vulnerability originates from insufficient server-side controls in the Secure Application Manager of Ivanti Connect Secure. Successful exploitation of the vulnerability allows a remote authenticated attacker to bypass restrictions.
Affected and Patched Versions
Product Name | Affected Versions | Patched Versions |
Ivanti Connect Secure (ICS) | 22.7R2.3 and prior | 22.7R2.4 |
Ivanti Policy Secure (IPS) | 22.7R1.1 and prior | 22.7R1.2 |
Ivanti Sentry | 9.20.1 and prior, 10.0.1 and prior | 9.20.2, 10.0.2, 10.1.0 |
Ivanti Cloud Services Application (CSA) | 5.0.2 and prior | 5.0.3 |
For more information, please refer to the Ivanti Security Advisories:
- Ivanti Sentry
- Ivanti Cloud Services Application (CSA)
- Ivanti Connect Secure (ICS) and Ivanti Policy Secure (IPS)
Qualys Detection
Qualys customers can scan their devices with QIDs 382559, 732091, and 732092 to detect vulnerable assets.
Please continue to follow Qualys Threat Protection for more coverage of the latest vulnerabilities.
References
https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Sentry-CVE-2024-8540?language=en_US
https://forums.ivanti.com/s/article/December-2024-Security-Advisory-Ivanti-Connect-Secure-ICS-and-Ivanti-Policy-Secure-IPS-Multiple-CVEs?language=en_US
https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Cloud-Services-Application-CSA-CVE-2024-11639-CVE-2024-11772-CVE-2024-11773?language=en_US