CVE-2024-21893
HIGHCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
Lifecycle Timeline
3Description
A server-side request forgery vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) and Ivanti Neurons for ZTA allows an attacker to access certain restricted resources without authentication.
Analysis
Ivanti Connect Secure and Policy Secure contain an SSRF vulnerability in the SAML component allowing unauthenticated access to restricted resources, used as an additional exploitation vector during the January 2024 Ivanti crisis.
Technical Context
The CWE-918 SSRF in the SAML authentication component allows attackers to make the Ivanti appliance send requests to internal services. This provides an alternative authentication bypass path to CVE-2023-46805 for reaching the command injection endpoint.
Affected Products
['Ivanti Connect Secure 9.x and 22.x', 'Ivanti Policy Secure 9.x and 22.x', 'Ivanti Neurons for ZTA']
Remediation
Apply all Ivanti security updates. Disable SAML if not required. Factory reset is recommended. Check for all known Ivanti exploitation indicators.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today