Ivanti Connect Secure XML External Entity Vulnerability
CVE-2024-22024

8.3HIGH

Key Information:

Vendor
Ivanti
Status
Vendor
CVE Published:
13 February 2024

Badges

๐Ÿฅ‡ Trended No. 1๐Ÿ“ˆ Trended๐Ÿ“ˆ Score: 18,200๐Ÿ’ฐ Ransomware๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC๐Ÿ“ฐ News Worthy

What is CVE-2024-22024?

CVE-2024-22024 is a significant vulnerability affecting Ivanti Connect Secure and Ivanti Policy Secure, utilized for secure remote access and policy management in enterprise environments. This specific vulnerability revolves around an XML external entity (XXE) issue in the SAML component of these products. An attacker exploiting this weakness could gain unauthorized access to restricted resources, undermining the integrity of the authentication mechanisms. For organizations relying on these Ivanti solutions, the potential consequences include unauthorized data access and increased risk of internal systems being compromised.

Technical Details

The vulnerability identified as CVE-2024-22024 stems from improper handling of XML input, allowing attackers to manipulate XML data and access sensitive information without proper authentication. It affects multiple versions of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x), as well as ZTA gateways. The exploit could occur through crafted XML requests targeted at the vulnerable components of the application, creating avenues for attackers to probe internal systems and extract confidential data.

Impact of the Vulnerability

  1. Unauthorized Access: The primary impact of this vulnerability is the potential for unauthorized access to sensitive resources. Attackers can exploit the XXE flaw to read files and data that should be protected, leading to severe information leaks.

  2. Data Breaches: Exploitations involving this vulnerability can facilitate data breaches, as it allows attackers to bypass authentication protocols, potentially exposing personally identifiable information (PII) or proprietary company data.

  3. Compromise of Internal Systems: The exploitation could also lead to further compromises within the network, as attackers might leverage gained access to introduce additional threats, escalate privileges, or deploy malware, thereby jeopardizing the organizationโ€™s overall security posture.

Affected Version(s)

ICS 9.1R14.5

ICS 9.1R17.3

ICS 9.1R18.4

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

Over 13,000 Ivanti gateways vulnerable to actively exploited bugs

Thousands of Ivanti Connect Secure and Policy Secure endpoints remain vulnerable to multiple security issues first disclosed more than a month ago and which the vendor gradually patched.

11 months ago

Attackers target new Ivanti XXE vulnerability days after patch

The new vulnerabilities were introduced by a fix for the previous Ivanti flaws, and customers are urged to install a new update.

11 months ago

Ivanti Finds Another High Severity Vulnerability

This is the fifth vulnerability revealed during February, with three of the flaws being actively exploited.

11 months ago

References

EPSS Score

1% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
8.3
Severity:
HIGH
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • ๐Ÿฅ‡

    Vulnerability reached the number 1 worldwide trending spot

  • ๐Ÿ’ฐ

    Used in Ransomware

  • ๐Ÿ“ˆ

    Vulnerability started trending

  • Vulnerability published

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • ๐Ÿ“ฐ

    First article discovered by Beeping Computers

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database1 Proof of Concept(s)13 News Article(s)
.