OS Command Injection in Ivanti Cloud Services Application
CVE-2024-47908

7.2HIGH

Key Information:

Vendor
Ivanti
Vendor
CVE Published:
11 February 2025

Badges

📈 Score: 172📰 News Worthy

What is CVE-2024-47908?

CVE-2024-47908 is a critical vulnerability identified in the Ivanti Cloud Services Application (CSA), which is designed to provide cloud-based solutions for IT management and service automation. This vulnerability allows remote authenticated attackers with admin privileges to execute arbitrary operating system commands through the application's admin web console. Such a weakness poses significant risks to organizations relying on Ivanti CSA for operational functions, as it can lead to unauthorized access and control over sensitive systems and data.

Technical Details

The vulnerability arises from improper input validation within the admin web console, specifically allowing OS command injection. Attackers leveraging this flaw can manipulate command execution on the underlying operating system, potentially leading to remote code execution. This issue affects versions of Ivanti CSA prior to 5.0.5, highlighting the importance of keeping software current to mitigate security risks.

Potential Impact of CVE-2024-47908

  1. Remote Code Execution: The ability for an attacker to execute arbitrary code could result in complete system compromise, allowing them to install malware, steal information, or further infiltrate the network.

  2. Data Breaches: Exploitation of this vulnerability could lead to unauthorized access to sensitive data, resulting in potential breaches of confidential information and compliance violations.

  3. Operational Disruption: In the event of a successful exploitation, organizations could face significant downtime and operational disruptions as compromised systems may need extensive remediation efforts.

Affected Version(s)

Cloud Services Application 5.0.5

News Articles

Ivanti fixes 4 critical flaws, including CVSS 9.9 in Connect Secure

The flaws could enable remote code execution or arbitrary file writing and should be patched immediately.

1 week ago

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • 📰

    First article discovered by SC Media

  • Vulnerability published

  • Vulnerability Reserved

.