Created on 2025-02-11 19:05 and updated on 2025-02-11 19:05.
Description
February Security Advisory Ivanti Connect Secure (ICS),Ivanti Policy Secure (IPS) and Ivanti Secure Access Client (ISAC) (Multiple CVEs)
Primary Product
Connect-Secure
Created Date
Feb 11, 2025 3:01:15 PM
Last Modified Date
Feb 11, 2025 3:37:50 PM
Summary
Ivanti has released updates for Ivanti Connect Secure (ICS),Ivanti Policy Secure (IPS) and Ivanti Secure Access Client (ISAC) which addresses medium, high and critical severity vulnerabilities.
We are not aware of any customers being exploited by these vulnerabilities at the time of disclosure.
Vulnerability Details
CVE Number
Description
CVSS Score (Severity)
CVSS Vector
CWE
Impacted Products
External control of a file name in Ivanti Connect Secure before version 22.7R2.4 and Ivanti Policy Secure before version 22.7R1.3 allows a remote authenticated attacker with admin privileges to write arbitrary files.
9.1 (Critical)
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CWE-73
Connect Secure & Policy Secure
A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.6 allows a remote authenticated attacker to achieve remote code execution.
9.9 (Critical)
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CWE-121
Connect Secure
Code injection in Ivanti Connect Secure before version 22.7R2.4 and Ivanti Policy Secure before version 22.7R1.3 allows a remote authenticated attacker with admin privileges to achieve remote code execution.
9.1 (Critical)
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CWE-94
Connect Secure & Policy Secure
External control of a file name in Ivanti Connect Secure before version 22.7R2.6 and Ivanti Policy Secure before version 22.7R1.3 allows a remote authenticated attacker with admin privileges to read arbitrary files.
6.8 (Medium)
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
CWE-73
Connect Secure & Policy Secure
Reflected XSS in Ivanti Connect Secure before version 22.7R2.6 and Ivanti Policy Secure before version 22.7R1.3 allows a remote unauthenticated attacker to obtain admin privileges. User interaction is required.
6.1 (Medium)
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CWE-79
Connect Secure & Policy Secure
A hardcoded key in Ivanti Connect Secure before version 22.7R2.3 and Ivanti Policy Secure before version 22.7R1.3 allows a local unauthenticated attacker to read sensitive data.
6.0 (Medium)
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
CWE-321
Connect Secure & Policy Secure
Cleartext storage of information in Ivanti Connect Secure before version 22.7R2.6 and Ivanti Policy Secure before version 22.7R1.3 allows a local unauthenticated attacker to read sensitive data.
6.0 (Medium)
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
CWE-312
Connect Secure & Policy Secure
Insufficient permissions in Ivanti Secure Access Client before version 22.8R1 allows a local authenticated attacker to delete arbitrary files.
7.1 (High)
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
CWE-732
Secure Access Client
Affected Versions
Product Name
Affected Versions
Resolved Versions
Patch Availability
Ivanti Connect Secure (ICS)
22.7R2.5 and below
22.7R2.6
Download Portal
Ivanti Policy Secure (IPS)
22.7R1.2 and below
22.7R1.3
Download Portal
Ivanti Secure Access Client (ISAC)
22.7R4 and below
22.8R1
Download Portal
Solution
These vulnerabilities are resolved on the latest version of the product and can be accessed in the download portal (Login Required):
- Ivanti Connect Secure 22.7R2.6
- Ivanti Policy Secure 22.7R1.3
- Ivanti Secure Access Client 22.8R1
Acknowledgements
Ivanti would like to thank the following for reporting the relevant issues and for working with Ivanti to help protect our customers:
- Matthew Galligan, CISA Rapid Action Force (CVE-2024-38657)
- Ori David of Akamai (CVE-2024-37374, CVE-2024-37375)
- sim0nsecurity of HackerOne (CVE-2024-13813)
Note: Ivanti is dedicated to ensuring the security and integrity of our enterprise software products. We recognize the vital role that security researchers, ethical hackers, and the broader security community play in identifying and reporting vulnerabilities. Visit HERE to learn more about our Vulnerability Disclosure Policy.
FAQ
- Are you aware of any active exploitation of these vulnerabilities?
We are not aware of any customers being exploited by these vulnerabilities prior to public disclosure. These vulnerabilities were disclosed through our responsible disclosure program.
- How can I tell if I have been compromised?
Currently, there is no known public exploitation of this vulnerability that could be used to provide a list of indicators of compromise. - What should I do if I need help?
If you have questions after reviewing this information, you can log a case and/or request a call via the Success Portal
- Are any of these vulnerability fixes backported to any of the 9.x versions?
No. The Pulse Connect Secure 9.x version of the product reached End of Engineering June 2024 and has reached End-of-Support as of December 31, 2024. Because of this, the 9.x version of Connect Secure no longer receives backported fixes. We strongly encourage customers to upgrade to Ivanti Connect Secure 22.7 to benefit from important security updates that we have made throughout the solution.
- What does it mean when a vulnerability describes remote authenticated attackers?
It means that an attacker who is able to interact with the vulnerable component and pass authentication is able to exploit the vulnerability.
Article Number :
000097586