8.8

CVE-2024-9420

A use-after-free in Ivanti Connect Secure before version 22.7R2.3 and 9.1R18.9

 and Ivanti Policy Secure before version 22.7R1.2 allows a remote authenticated attacker to achieve remote code execution

Data is provided by the National Vulnerability Database (NVD)
IvantiConnect Secure Version < 9.1
IvantiConnect Secure Version >= 21.9 < 22.7
IvantiConnect Secure Version9.1 Update-
IvantiConnect Secure Version9.1 Updater1
IvantiConnect Secure Version9.1 Updater1.0
IvantiConnect Secure Version9.1 Updater10
IvantiConnect Secure Version9.1 Updater10.0
IvantiConnect Secure Version9.1 Updater10.2
IvantiConnect Secure Version9.1 Updater11
IvantiConnect Secure Version9.1 Updater11.0
IvantiConnect Secure Version9.1 Updater11.1
IvantiConnect Secure Version9.1 Updater11.3
IvantiConnect Secure Version9.1 Updater11.4
IvantiConnect Secure Version9.1 Updater11.5
IvantiConnect Secure Version9.1 Updater12
IvantiConnect Secure Version9.1 Updater12.1
IvantiConnect Secure Version9.1 Updater12.2
IvantiConnect Secure Version9.1 Updater13
IvantiConnect Secure Version9.1 Updater13.1
IvantiConnect Secure Version9.1 Updater14
IvantiConnect Secure Version9.1 Updater14.4
IvantiConnect Secure Version9.1 Updater15
IvantiConnect Secure Version9.1 Updater15.2
IvantiConnect Secure Version9.1 Updater16
IvantiConnect Secure Version9.1 Updater16.1
IvantiConnect Secure Version9.1 Updater17
IvantiConnect Secure Version9.1 Updater17.1
IvantiConnect Secure Version9.1 Updater17.2
IvantiConnect Secure Version9.1 Updater18
IvantiConnect Secure Version9.1 Updater18.1
IvantiConnect Secure Version9.1 Updater18.2
IvantiConnect Secure Version9.1 Updater18.3
IvantiConnect Secure Version9.1 Updater18.7
IvantiConnect Secure Version9.1 Updater18.8
IvantiConnect Secure Version9.1 Updater2
IvantiConnect Secure Version9.1 Updater2.0
IvantiConnect Secure Version9.1 Updater3
IvantiConnect Secure Version9.1 Updater3.0
IvantiConnect Secure Version9.1 Updater4
IvantiConnect Secure Version9.1 Updater4.0
IvantiConnect Secure Version9.1 Updater4.1
IvantiConnect Secure Version9.1 Updater4.2
IvantiConnect Secure Version9.1 Updater4.3
IvantiConnect Secure Version9.1 Updater5
IvantiConnect Secure Version9.1 Updater5.0
IvantiConnect Secure Version9.1 Updater6
IvantiConnect Secure Version9.1 Updater6.0
IvantiConnect Secure Version9.1 Updater7
IvantiConnect Secure Version9.1 Updater7.0
IvantiConnect Secure Version9.1 Updater8
IvantiConnect Secure Version9.1 Updater8.0
IvantiConnect Secure Version9.1 Updater8.1
IvantiConnect Secure Version9.1 Updater8.2
IvantiConnect Secure Version9.1 Updater8.4
IvantiConnect Secure Version9.1 Updater9
IvantiConnect Secure Version9.1 Updater9.0
IvantiConnect Secure Version9.1 Updater9.1
IvantiConnect Secure Version9.1 Updater9.2
IvantiConnect Secure Version22.7 Update-
IvantiConnect Secure Version22.7 Updater1
IvantiConnect Secure Version22.7 Updater1.1
IvantiConnect Secure Version22.7 Updater1.2
IvantiConnect Secure Version22.7 Updater1.3
IvantiConnect Secure Version22.7 Updater1.4
IvantiConnect Secure Version22.7 Updater1.5
IvantiConnect Secure Version22.7 Updater2
IvantiConnect Secure Version22.7 Updater2.1
IvantiConnect Secure Version22.7 Updater2.2
IvantiPolicy Secure Version < 22.7
IvantiPolicy Secure Version22.7 Update-
IvantiPolicy Secure Version22.7 Updater1
IvantiPolicy Secure Version22.7 Updater1.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 29.06% 0.964
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
134c704f-9b21-4f2e-91b3-4a467353bcc0 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-416 Use After Free

The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.