PT-2023-8231 · Ivanti · Ivanti Connect Secure +1
Published
2023-01-24
·
Updated
2025-12-20
·
CVE-2024-21887
CVSS v3.1
9.1
9.1
Critical
| Base vector | Vector | AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Ivanti Connect Secure versions 9.0 through 22.3
Ivanti Policy Secure versions 9.0 through 22.3
Description
A command injection flaw exists in web components of Ivanti Connect Secure and Ivanti Policy Secure. An authenticated administrator can send specially crafted requests, leading to the execution of arbitrary commands on the appliance. This issue is actively exploited in the wild by threat actors, including Chinese state-sponsored groups. Reports indicate the use of this vulnerability to gain remote access, modify system settings, and deploy malicious software, such as webshells and backdoors. Approximately 8.7K vulnerable IPs were identified, with over 800 still exposed. The vulnerability is being actively scanned for and exploited.
Recommendations
Ivanti Connect Secure versions 9.0 through 22.3: At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Ivanti Policy Secure versions 9.0 through 22.3: At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Exploit
Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2024-00249
CVE-2024-21887
Affected Products
Ivanti Connect Secure
Ivanti Policy Secure
References · 463
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/ivanti_connect_secure_rce_cve_2024_21893.rb⭐ 35742 🔗 14363 · Exploit
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/ivanti_connect_secure_rce_cve_2023_46805.rb⭐ 34300 🔗 14014 · Exploit
- 🔥 https://github.com/Chocapikk/CVE-2024-21887⭐ 52 🔗 13 · Exploit
- 🔥 https://github.com/duy-31/CVE-2023-46805_CVE-2024-21887⭐ 19 🔗 4 · Exploit
- 🔥 https://github.com/seajaysec/Ivanti-Connect-Around-Scan⭐ 12 🔗 3 · Exploit
- 🔥 https://github.com/yoryio/CVE-2023-46805_CVE-2024-21887_Scanner⭐ 10 🔗 3 · Exploit
- 🔥 https://github.com/oways/ivanti-CVE-2024-21887⭐ 8 🔗 1 · Exploit
- 🔥 https://github.com/raminkarimkhani1996/CVE-2023-46805_CVE-2024-21887⭐ 4 🔗 1 · Exploit
- 🔥❌ https://github.com/rxwx/pulse-meter · Exploit, Deleted
- 🔥❌ https://github.com/TheRedDevil1/Check-Vulns-Script · Exploit, Deleted
- 🔥 http://packetstormsecurity.com/files/176668/Ivanti-Connect-Secure-Unauthenticated-Remote-Code-Execution.html · Exploit
- https://forums.ivanti.com/s/article/CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2024-21887 · Security Note
- https://bdu.fstec.ru/vul/2024-00249 · Security Note
- https://github.com/volexity/threat-intel/blob/main/2024/2024-01-10%20Ivanti%20Connect%20Secure/indicators/iocs.csv⭐ 336 🔗 56 · Note