CVE-2023-46805
HIGHCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
Lifecycle Timeline
4Description
An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks.
Analysis
Ivanti Connect Secure and Policy Secure contain an authentication bypass in the web component allowing unauthenticated access to restricted resources, chained with CVE-2024-21887 for unauthenticated RCE in massive exploitation campaigns starting January 2024.
Technical Context
The CWE-287 authentication bypass allows attackers to circumvent web component access controls through crafted requests. Chained with CVE-2024-21887 (command injection), this enables unauthenticated remote code execution on Ivanti VPN appliances.
Affected Products
['Ivanti Connect Secure 9.x and 22.x', 'Ivanti Policy Secure 9.x and 22.x']
Remediation
Apply Ivanti patches. CISA recommends factory reset before patching due to persistent implant concerns. Rotate all credentials. Run Ivanti's Integrity Checker Tool. Consider migrating to alternative VPN solutions.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today