Created on 2025-02-11 19:05 and updated on 2025-02-11 19:05.

Description

February Security Advisory Ivanti Connect Secure (ICS),Ivanti Policy Secure (IPS) and Ivanti Secure Access Client (ISAC) (Multiple CVEs)

Primary Product

Connect-Secure

Created Date

Feb 11, 2025 3:01:15 PM

Last Modified Date

Feb 11, 2025 3:37:50 PM

Summary

Ivanti has released updates for Ivanti Connect Secure (ICS),Ivanti Policy Secure (IPS) and Ivanti Secure Access Client (ISAC) which addresses medium, high and critical severity vulnerabilities. 

We are not aware of any customers being exploited by these vulnerabilities at the time of disclosure.

Vulnerability Details

CVE Number

Description

CVSS Score (Severity)

CVSS Vector

CWE

Impacted Products

CVE-2024-38657

External control of a file name in Ivanti Connect Secure before version 22.7R2.4 and Ivanti Policy Secure before version 22.7R1.3 allows a remote authenticated attacker with admin privileges to write arbitrary files.

9.1 (Critical)

CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

CWE-73

Connect Secure & Policy Secure

CVE-2025-22467

A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.6 allows a remote authenticated attacker to achieve remote code execution.

9.9 (Critical)

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

CWE-121

Connect Secure

CVE-2024-10644

Code injection in Ivanti Connect Secure before version 22.7R2.4 and Ivanti Policy Secure before version 22.7R1.3 allows a remote authenticated attacker with admin privileges to achieve remote code execution.

9.1 (Critical)

CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

CWE-94

Connect Secure & Policy Secure

CVE-2024-12058

External control of a file name in Ivanti Connect Secure before version 22.7R2.6 and Ivanti Policy Secure before version 22.7R1.3 allows a remote authenticated attacker with admin privileges to read arbitrary files.

6.8 (Medium)

CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N

CWE-73

Connect Secure & Policy Secure

CVE-2024-13830

Reflected XSS in Ivanti Connect Secure before version 22.7R2.6 and Ivanti Policy Secure before version 22.7R1.3 allows a remote unauthenticated attacker to obtain admin privileges. User interaction is required.

6.1 (Medium)

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

CWE-79

Connect Secure & Policy Secure

CVE-2024-13842

A hardcoded key in Ivanti Connect Secure before version 22.7R2.3 and Ivanti Policy Secure before version 22.7R1.3 allows a local unauthenticated attacker to read sensitive data.

6.0 (Medium)

CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N

CWE-321

Connect Secure & Policy Secure

CVE-2024-13843

Cleartext storage of information in Ivanti Connect Secure before version 22.7R2.6 and Ivanti Policy Secure before version 22.7R1.3 allows a local unauthenticated attacker to read sensitive data.

6.0 (Medium)

CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N

CWE-312

Connect Secure & Policy Secure

CVE-2024-13813

Insufficient permissions in Ivanti Secure Access Client before version 22.8R1 allows a local authenticated attacker to delete arbitrary files.

7.1 (High)

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

CWE-732

Secure Access Client

Affected Versions

Product Name

Affected Versions

Resolved Versions

Patch Availability

Ivanti Connect Secure (ICS)

22.7R2.5 and below

22.7R2.6

Download Portal

https://portal.ivanti.com/

Ivanti Policy Secure (IPS)

22.7R1.2 and below

22.7R1.3

Download Portal

https://portal.ivanti.com/

Ivanti Secure Access Client (ISAC)

22.7R4 and below

22.8R1

Download Portal

https://portal.ivanti.com/

Solution

These vulnerabilities are resolved on the latest version of the product and can be accessed in the download portal (Login Required):

  • Ivanti Connect Secure 22.7R2.6
  • Ivanti Policy Secure 22.7R1.3
  • Ivanti Secure Access Client 22.8R1

Acknowledgements

Ivanti would like to thank the following for reporting the relevant issues and for working with Ivanti to help protect our customers:

Note: Ivanti is dedicated to ensuring the security and integrity of our enterprise software products. We recognize the vital role that security researchers, ethical hackers, and the broader security community play in identifying and reporting vulnerabilities. Visit HERE to learn more about our Vulnerability Disclosure Policy.

FAQ

  1. Are you aware of any active exploitation of these vulnerabilities?

We are not aware of any customers being exploited by these vulnerabilities prior to public disclosure. These vulnerabilities were disclosed through our responsible disclosure program. 

  1. How can I tell if I have been compromised?
    Currently, there is no known public exploitation of this vulnerability that could be used to provide a list of indicators of compromise.
  2. What should I do if I need help? 

If you have questions after reviewing this information, you can log a case and/or request a call via the Success Portal 

  1. Are any of these vulnerability fixes backported to any of the 9.x versions?

No. The Pulse Connect Secure 9.x version of the product reached End of Engineering June 2024 and has reached End-of-Support as of December 31, 2024. Because of this, the 9.x version of Connect Secure no longer receives backported fixes. We strongly encourage customers to upgrade to Ivanti Connect Secure 22.7 to benefit from important security updates that we have made throughout the solution. 

  1. What does it mean when a vulnerability describes remote authenticated attackers?

It means that an attacker who is able to interact with the vulnerable component and pass authentication is able to exploit the vulnerability.     

Article Number :

000097586

Vulnerabilities included in this bundle

Author

Alexandre Dulaunoy

Combined sightings

Author Vulnerability Source Type Date
automationCVE-2024-12058https://social.circl.lu/users/cedric/statuses/113986844143593949seen1 month ago
automationCVE-2024-12058https://bsky.app/profile/cve-notifications.bsky.social/post/3lhw2mecrol2hseen1 month ago
automationCVE-2024-12058https://infosec.exchange/users/cve/statuses/113985946502062448seen1 month ago
automationCVE-2024-13830https://social.circl.lu/users/cedric/statuses/113986844143593949seen1 month ago
automationCVE-2024-13830https://bsky.app/profile/cve-notifications.bsky.social/post/3lhw2mltlp62xseen1 month ago
automationCVE-2024-13830https://infosec.exchange/users/cve/statuses/113985946518586560seen1 month ago
automationCVE-2024-13843https://bsky.app/profile/cve.skyfleet.blue/post/3li6wypsk522vseen1 month ago
automationCVE-2024-13843https://bsky.app/profile/cve-notifications.bsky.social/post/3li6k5wjfmn2nseen1 month ago
automationCVE-2024-13843https://social.circl.lu/users/cedric/statuses/113986844143593949seen1 month ago
automationCVE-2024-13843https://bsky.app/profile/cve-notifications.bsky.social/post/3lhw2mqwcqj2zseen1 month ago
automationCVE-2024-38657https://mastodon.social/users/CyberSignaler/statuses/114040301755313093seen1 month ago
automationCVE-2024-38657https://bsky.app/profile/cve.skyfleet.blue/post/3linzvcfdrd2pseen1 month ago
automationCVE-2024-38657https://poliverso.org/objects/0477a01e-6c3cfb92-62b4327e96b9e56eseen1 month ago
automationCVE-2024-38657https://bsky.app/profile/securityrss.bsky.social/post/3lhypiivg5y2lseen1 month ago
automationCVE-2024-38657https://bsky.app/profile/hackingne.ws/post/3lhxivy7pmn2useen1 month ago
automationCVE-2024-38657https://thehackernews.com/2025/02/ivanti-patches-critical-flaws-in.htmlseen1 month ago
automationCVE-2024-38657https://social.circl.lu/users/cedric/statuses/113986844143593949seen1 month ago
automationCVE-2024-13813https://social.circl.lu/users/cedric/statuses/113986844143593949seen1 month ago
automationCVE-2024-13813https://bsky.app/profile/cve-notifications.bsky.social/post/3lhw2mjhqwy2xseen1 month ago
automationCVE-2024-10644https://poliverso.org/objects/0477a01e-6c3cfb92-62b4327e96b9e56eseen1 month ago
automationCVE-2024-10644https://mstdn.ca/users/rfwaveio/statuses/113994065845326371seen1 month ago
automationCVE-2024-10644https://bsky.app/profile/securityrss.bsky.social/post/3lhypiivg5y2lseen1 month ago
automationCVE-2024-10644https://social.circl.lu/users/cedric/statuses/113986844143593949seen1 month ago
automationCVE-2024-10644https://bsky.app/profile/cve.skyfleet.blue/post/3lhw5dy5qtn2useen1 month ago
automationCVE-2024-10644https://mastodon.social/users/CyberSignaler/statuses/113986273904768180seen1 month ago
automationCVE-2024-10644https://bsky.app/profile/cve-notifications.bsky.social/post/3lhw2m62pc62aseen1 month ago
automationCVE-2024-10644https://infosec.exchange/users/cve/statuses/113985946473235472seen1 month ago