Refine your search
1 vulnerability found for ICS by Ivant
CVE-2024-22024 (GCVE-0-2024-22024)
Vulnerability from nvd
Published
2024-02-13 04:07
Modified
2025-05-09 18:26
Severity ?
VLAI Severity ?
EPSS score ?
Summary
An XML external entity or XXE vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x), Ivanti Policy Secure (9.x, 22.x) and ZTA gateways which allows an attacker to access certain restricted resources without authentication.
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Ivanti | ICS |
Version: 9.1R14.5 ≤ Version: 9.1R17.3 ≤ Version: 9.1R18.4 ≤ Version: 22.1R6.1 ≤ Version: 22.2R4.1 ≤ Version: 22.3R1.1 ≤ Version: 22.4R1.1 ≤ Version: 22.5R1.2 ≤ Version: 22.6R1.1 ≤ Version: 22.4R2.3 ≤ Version: 22.5R2.3 ≤ Version: 22.6R2.2 ≤ |
||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-01T22:35:34.846Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://forums.ivanti.com/s/article/CVE-2024-22024-XXE-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure?language=en_US"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-22024",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-16T19:34:58.517182Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-611",
"description": "CWE-611 Improper Restriction of XML External Entity Reference",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-05-09T18:26:09.386Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "ICS",
"vendor": "Ivanti",
"versions": [
{
"lessThan": "9.1R14.5",
"status": "affected",
"version": "9.1R14.5",
"versionType": "semver"
},
{
"lessThan": "9.1R17.3",
"status": "affected",
"version": "9.1R17.3",
"versionType": "semver"
},
{
"lessThan": "9.1R18.4",
"status": "affected",
"version": "9.1R18.4",
"versionType": "semver"
},
{
"lessThan": "22.1R6.1",
"status": "affected",
"version": "22.1R6.1",
"versionType": "semver"
},
{
"lessThan": "9.1R14.4",
"status": "unaffected",
"version": "9.1R14.4",
"versionType": "semver"
},
{
"lessThan": "9.1R15.2",
"status": "unaffected",
"version": "9.1R15.2",
"versionType": "semver"
},
{
"lessThan": "9.1R16.2",
"status": "unaffected",
"version": "9.1R16.2",
"versionType": "semver"
},
{
"lessThan": "9.1R17.2",
"status": "unaffected",
"version": "9.1R17.2",
"versionType": "semver"
},
{
"lessThan": "9.1R18.3",
"status": "unaffected",
"version": "9.1R18.3",
"versionType": "semver"
},
{
"lessThan": "22.1R6.1",
"status": "unaffected",
"version": "22.1R6.1",
"versionType": "semver"
},
{
"lessThan": "22.2R4.1",
"status": "affected",
"version": "22.2R4.1",
"versionType": "semver"
},
{
"lessThan": "22.3R1.1",
"status": "affected",
"version": "22.3R1.1",
"versionType": "semver"
},
{
"lessThan": "22.4R1.1",
"status": "affected",
"version": "22.4R1.1",
"versionType": "semver"
},
{
"lessThan": "22.5R1.2",
"status": "affected",
"version": "22.5R1.2",
"versionType": "semver"
},
{
"lessThan": "22.6R1.1",
"status": "affected",
"version": "22.6R1.1",
"versionType": "semver"
},
{
"lessThan": "22.4R2.3",
"status": "affected",
"version": "22.4R2.3",
"versionType": "semver"
},
{
"lessThan": "22.5R2.3",
"status": "affected",
"version": "22.5R2.3",
"versionType": "semver"
},
{
"lessThan": "22.6R2.2",
"status": "affected",
"version": "22.6R2.2",
"versionType": "semver"
},
{
"lessThan": "22.2R4.1",
"status": "unaffected",
"version": "22.2R4.1",
"versionType": "semver"
},
{
"lessThan": "22.3R1",
"status": "unaffected",
"version": "22.3R1",
"versionType": "semver"
},
{
"lessThan": "22.4R1.1",
"status": "unaffected",
"version": "22.4R1.1",
"versionType": "semver"
},
{
"lessThan": "22.5R1.1",
"status": "unaffected",
"version": "22.5R1.1",
"versionType": "semver"
},
{
"lessThan": "22.6R1.1",
"status": "unaffected",
"version": "22.6R1.1",
"versionType": "semver"
},
{
"lessThan": "22.4R2.2",
"status": "unaffected",
"version": "22.4R2.2",
"versionType": "semver"
},
{
"lessThan": "22.5R2.2",
"status": "unaffected",
"version": "22.5R2.2",
"versionType": "semver"
},
{
"lessThan": "22.6R2.2",
"status": "unaffected",
"version": "22.6R2.2",
"versionType": "semver"
}
]
},
{
"product": "ICS",
"vendor": "Ivant ",
"versions": [
{
"lessThan": "9.1R15.3",
"status": "affected",
"version": "9.1R15.3",
"versionType": "semver"
}
]
},
{
"product": "IPS",
"vendor": "Ivanti",
"versions": [
{
"lessThan": "9.1R18.4",
"status": "affected",
"version": "9.1R18.4",
"versionType": "semver"
},
{
"lessThan": "9.1R17.3",
"status": "affected",
"version": "9.1R17.3",
"versionType": "semver"
},
{
"lessThan": "22.5R1.2",
"status": "affected",
"version": "22.5R1.2",
"versionType": "semver"
},
{
"lessThan": "9.1R18.2",
"status": "unaffected",
"version": "9.1R18.2",
"versionType": "semver"
},
{
"lessThan": "9.1R17.2",
"status": "unaffected",
"version": "9.1R17.2",
"versionType": "semver"
},
{
"lessThan": "22.5R1.1",
"status": "unaffected",
"version": "22.5R1.1",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An XML external entity or XXE vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x), Ivanti Policy Secure (9.x, 22.x) and ZTA gateways which allows an attacker to access certain restricted resources without authentication."
}
],
"metrics": [
{
"cvssV3_0": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-02-13T04:07:04.355Z",
"orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
"shortName": "hackerone"
},
"references": [
{
"url": "https://forums.ivanti.com/s/article/CVE-2024-22024-XXE-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure?language=en_US"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
"assignerShortName": "hackerone",
"cveId": "CVE-2024-22024",
"datePublished": "2024-02-13T04:07:04.355Z",
"dateReserved": "2024-01-04T01:04:06.574Z",
"dateUpdated": "2025-05-09T18:26:09.386Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}