Ivanti Connect Secure Suffers from Heap Overflow Vulnerability, Leading to DoS Attacks
CVE-2024-21894

9.8CRITICAL

Key Information:

Vendor
Ivanti
Vendor
CVE Published:
4 April 2024

Badges

💰 Ransomware👾 Exploit Exists📰 News Worthy

Summary

Vulnerability CVE-2024-21894 affects Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure and allows an unauthenticated attacker to crash the service, leading to a denial-of-service (DoS) attack. In certain conditions, this vulnerability may also result in the execution of arbitrary code. It is part of a group of vulnerabilities that include heap overflow, null pointer dereference, and XML entity expansion, which pose serious threats to the security of the affected software. Ivanti has released patches to address these vulnerabilities and organizations are strongly recommended to apply these updates as soon as possible to mitigate the risk. No evidence of exploitation by threat actors, including ransomware groups, has been reported so far.

Affected Version(s)

Connect Secure 22.1R6.2

Connect Secure 22.2R4.2

Connect Secure 22.3R1.2

News Articles

Numerous Ivanti VPN gateways impacted by RCE vulnerability

BleepingComputer reports that attacks leveraging a recently patched high-severity heap overflow vulnerability, tracked as CVE-2024-21894, could impact nearly 16,500 internet-exposed Ivanti Connect Secure and Poly Secure VPN gateways.

7 months ago

+16K Ivanti VPN gateways still vulnerable to RCE CVE-2024-21894

Experts warn of roughly 16,500 Ivanti Connect Secure and Poly Secure gateways still vulnerable to a remote code execution (RCE) flaw.

9 months ago

New Ivanti RCE flaw may impact 16,000 exposed VPN gateways

Approximately 16,500 Ivanti Connect Secure and Poly Secure gateways exposed on the internet are likely vulnerable to a remote code execution (RCE) flaw the vendor addressed earlier this week.

9 months ago

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 💰

    Used in Ransomware

  • Vulnerability published

  • 👾

    Exploit known to exist

  • 📰

    First article discovered by BleepingComputer

Collectors

NVD DatabaseMitre Database0 Proof of Concept(s)13 News Article(s)
.