8.2

CVE-2023-46805

Warnung
Exploit

An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
IvantiConnect Secure Version9.0
IvantiConnect Secure Version9.1 Updater1
IvantiConnect Secure Version9.1 Updater10
IvantiConnect Secure Version9.1 Updater11
IvantiConnect Secure Version9.1 Updater11.3
IvantiConnect Secure Version9.1 Updater11.4
IvantiConnect Secure Version9.1 Updater11.5
IvantiConnect Secure Version9.1 Updater12
IvantiConnect Secure Version9.1 Updater12.1
IvantiConnect Secure Version9.1 Updater13
IvantiConnect Secure Version9.1 Updater13.1
IvantiConnect Secure Version9.1 Updater14
IvantiConnect Secure Version9.1 Updater15
IvantiConnect Secure Version9.1 Updater15.2
IvantiConnect Secure Version9.1 Updater16
IvantiConnect Secure Version9.1 Updater16.1
IvantiConnect Secure Version9.1 Updater17
IvantiConnect Secure Version9.1 Updater17.1
IvantiConnect Secure Version9.1 Updater18
IvantiConnect Secure Version9.1 Updater2
IvantiConnect Secure Version9.1 Updater3
IvantiConnect Secure Version9.1 Updater4
IvantiConnect Secure Version9.1 Updater4.1
IvantiConnect Secure Version9.1 Updater4.2
IvantiConnect Secure Version9.1 Updater4.3
IvantiConnect Secure Version9.1 Updater5
IvantiConnect Secure Version9.1 Updater6
IvantiConnect Secure Version9.1 Updater7
IvantiConnect Secure Version9.1 Updater8
IvantiConnect Secure Version9.1 Updater8.1
IvantiConnect Secure Version9.1 Updater8.2
IvantiConnect Secure Version9.1 Updater9
IvantiConnect Secure Version9.1 Updater9.1
IvantiConnect Secure Version22.1 Updater1
IvantiConnect Secure Version22.1 Updater6
IvantiConnect Secure Version22.2 Update-
IvantiConnect Secure Version22.2 Updater1
IvantiConnect Secure Version22.3 Updater1
IvantiConnect Secure Version22.4 Updater1
IvantiConnect Secure Version22.4 Updater2.1
IvantiConnect Secure Version22.5 Updater2.1
IvantiConnect Secure Version22.6 Update-
IvantiConnect Secure Version22.6 Updater1
IvantiConnect Secure Version22.6 Updater2
IvantiPolicy Secure Version9.0
IvantiPolicy Secure Version9.1 Updater1
IvantiPolicy Secure Version9.1 Updater10
IvantiPolicy Secure Version9.1 Updater11
IvantiPolicy Secure Version9.1 Updater12
IvantiPolicy Secure Version9.1 Updater13
IvantiPolicy Secure Version9.1 Updater13.1
IvantiPolicy Secure Version9.1 Updater14
IvantiPolicy Secure Version9.1 Updater15
IvantiPolicy Secure Version9.1 Updater16
IvantiPolicy Secure Version9.1 Updater17
IvantiPolicy Secure Version9.1 Updater18
IvantiPolicy Secure Version9.1 Updater2
IvantiPolicy Secure Version9.1 Updater3
IvantiPolicy Secure Version9.1 Updater3.1
IvantiPolicy Secure Version9.1 Updater4
IvantiPolicy Secure Version9.1 Updater4.1
IvantiPolicy Secure Version9.1 Updater4.2
IvantiPolicy Secure Version9.1 Updater5
IvantiPolicy Secure Version9.1 Updater6
IvantiPolicy Secure Version9.1 Updater7
IvantiPolicy Secure Version9.1 Updater8
IvantiPolicy Secure Version9.1 Updater8.1
IvantiPolicy Secure Version9.1 Updater8.2
IvantiPolicy Secure Version9.1 Updater9
IvantiPolicy Secure Version22.1 Updater1
IvantiPolicy Secure Version22.1 Updater6
IvantiPolicy Secure Version22.2 Updater1
IvantiPolicy Secure Version22.2 Updater3
IvantiPolicy Secure Version22.3 Updater1
IvantiPolicy Secure Version22.3 Updater3
IvantiPolicy Secure Version22.4 Updater1
IvantiPolicy Secure Version22.4 Updater2
IvantiPolicy Secure Version22.4 Updater2.1
IvantiPolicy Secure Version22.5 Updater1
IvantiPolicy Secure Version22.5 Updater2.1
IvantiPolicy Secure Version22.6 Updater1

10.01.2024: CISA Known Exploited Vulnerabilities (KEV) Catalog

Ivanti Connect Secure and Policy Secure Authentication Bypass Vulnerability

Schwachstelle

Ivanti Connect Secure (ICS, formerly known as Pulse Connect Secure) and Ivanti Policy Secure gateways contain an authentication bypass vulnerability in the web component that allows an attacker to access restricted resources by bypassing control checks. This vulnerability can be leveraged in conjunction with CVE-2024-21887, a command injection vulnerability.

Beschreibung

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 94.38% 1
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 8.2 3.9 4.2
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
support@hackerone.com 8.2 3.9 4.2
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
CWE-287 Improper Authentication

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.