Summary
Detail | |||
---|---|---|---|
Vendor | Ivanti | First view | 2017-08-29 |
Product | Connect Secure | Last view | 2025-04-03 |
Version | 8.2 | Type | Application |
Update | r2.0 | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:ivanti:connect_secure |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
9.8 | 2025-04-03 | CVE-2025-22457 | A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.6, Ivanti Policy Secure before version 22.7R1.4, and Ivanti ZTA Gateways before version 22.8R2.2 allows a remote unauthenticated attacker to achieve remote code execution. |
8.8 | 2025-02-11 | CVE-2025-22467 | A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.6 allows a remote authenticated attacker to achieve remote code execution. |
4.4 | 2025-02-11 | CVE-2024-13843 | Cleartext storage of information in Ivanti Connect Secure before version 22.7R2.6 and Ivanti Policy Secure before version 22.7R1.3 allows a local authenticated attacker with admin privileges to read sensitive data. |
4.4 | 2025-02-11 | CVE-2024-13842 | A hardcoded key in Ivanti Connect Secure before version 22.7R2.3 and Ivanti Policy Secure before version 22.7R1.3 allows a local authenticated attacker with admin privileges to read sensitive data. |
6.1 | 2025-02-11 | CVE-2024-13830 | Reflected XSS in Ivanti Connect Secure before version 22.7R2.6 and Ivanti Policy Secure before version 22.7R1.3 allows a remote unauthenticated attacker to obtain admin privileges. User interaction is required. |
7 | 2025-01-08 | CVE-2025-0283 | A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a local authenticated attacker to escalate their privileges. |
0 | 2024-12-12 | CVE-2024-37401 | An out-of-bounds read in IPsec of Ivanti Connect Secure before version 22.7R2.1 allows a remote unauthenticated attacker to cause a denial of service. |
0 | 2024-12-12 | CVE-2024-37377 | A heap-based buffer overflow in IPsec of Ivanti Connect Secure before version 22.7R2.3 allows a remote unauthenticated attacker to cause a denial of service. |
8.8 | 2024-12-10 | CVE-2024-9844 | Insufficient server-side controls in Secure Application Manager of Ivanti Connect Secure before version 22.7R2.4 allows a remote authenticated attacker to bypass restrictions. |
7.2 | 2024-12-10 | CVE-2024-11634 | Command injection in Ivanti Connect Secure before version 22.7R2.3 and Ivanti Policy Secure before version 22.7R1.2 allows a remote authenticated attacker with admin privileges to achieve remote code execution. (Not applicable to 9.1Rx) |
7.2 | 2024-12-10 | CVE-2024-11633 | Argument injection in Ivanti Connect Secure before version 22.7R2.4 allows a remote authenticated attacker with admin privileges to achieve remote code execution |
0 | 2024-11-13 | CVE-2024-38656 | Argument injection in Ivanti Connect Secure before version 22.7R2.2 and 9.1R18.9 and Ivanti Policy Secure before version 22.7R1.2 allows a remote authenticated attacker with admin privileges to achieve remote code execution. |
7.2 | 2024-11-13 | CVE-2024-38655 | Argument injection in Ivanti Connect Secure before version 22.7R2.1 and 9.1R18.9 and Ivanti Policy Secure before version 22.7R1.1 and 9.1R18.9 allows a remote authenticated attacker with admin privileges to achieve remote code execution. |
0 | 2024-11-13 | CVE-2024-37400 | An out of bounds read in Ivanti Connect Secure before version 22.7R2.3 allows a remote unauthenticated attacker to trigger an infinite loop, causing a denial of service. |
8.8 | 2024-11-12 | CVE-2024-9420 | A use-after-free in Ivanti Connect Secure before version 22.7R2.3 and 9.1R18.9 and Ivanti Policy Secure before version 22.7R1.2 allows a remote authenticated attacker to achieve remote code execution |
7.5 | 2024-11-12 | CVE-2024-8495 | A null pointer dereference in Ivanti Connect Secure before version 22.7R2.1 and Ivanti Policy Secure before version 22.7R1.1 allows a remote unauthenticated attacker to cause a denial of service. |
4.9 | 2024-11-12 | CVE-2024-47909 | A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.3 and Ivanti Policy Secure before version 22.7R1.2 allows a remote authenticated attacker with admin privileges to cause a denial of service. |
7.5 | 2024-11-12 | CVE-2024-47907 | A stack-based buffer overflow in IPsec of Ivanti Connect Secure before version 22.7R2.3 allows a remote unauthenticated attacker to cause a denial of service. |
7.8 | 2024-11-12 | CVE-2024-47906 | Excessive binary privileges in Ivanti Connect Secure before version 22.7R2.3 (Not Applicable to 9.1Rx) and Ivanti Policy Secure before version 22.7R1.2 (Not Applicable to 9.1Rx) allows a local authenticated attacker to escalate privileges. |
4.9 | 2024-11-12 | CVE-2024-47905 | A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.3 and Ivanti Policy Secure before version 22.7R1.2 allows a remote authenticated attacker with admin privileges to cause a denial of service. |
7.2 | 2024-11-12 | CVE-2024-11007 | Command injection in Ivanti Connect Secure before version 22.7R2.1 (Not Applicable to 9.1Rx) and Ivanti Policy Secure before version 22.7R1.1 (Not Applicable to 9.1Rx) allows a remote authenticated attacker with admin privileges to achieve remote code execution. |
7.2 | 2024-11-12 | CVE-2024-11006 | Command injection in Ivanti Connect Secure before version 22.7R2.1 (Not Applicable to 9.1Rx) and Ivanti Policy Secure before version 22.7R1.1 (Not Applicable to 9.1Rx) allows a remote authenticated attacker with admin privileges to achieve remote code execution. |
7.2 | 2024-11-12 | CVE-2024-11005 | Command injection in Ivanti Connect Secure before version 22.7R2.1 (Not Applicable to 9.1Rx) and Ivanti Policy Secure before version 22.7R1.1 (Not Applicable to 9.1Rx) allows a remote authenticated attacker with admin privileges to achieve remote code execution. |
6.1 | 2024-11-12 | CVE-2024-11004 | Reflected XSS in Ivanti Connect Secure before version 22.7R2.1 and Ivanti Policy Secure before version 22.7R1.1 allows a remote unauthenticated attacker to obtain admin privileges. User interaction is required. |
7.5 | 2022-12-05 | CVE-2022-35258 | An unauthenticated attacker can cause a denial-of-service to the following products: Ivanti Connect Secure (ICS) in versions prior to 9.1R14.3, 9.1R15.2, 9.1R16.2, and 22.2R4, Ivanti Policy Secure (IPS) in versions prior to 9.1R17 and 22.3R1, and Ivanti Neurons for Zero-Trust Access in versions prior to 22.3R1. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
14% (6) | CWE-787 | Out-of-bounds Write |
14% (6) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
9% (4) | CWE-78 | Improper Sanitization of Special Elements used in an OS Command ('O... |
9% (4) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
4% (2) | CWE-611 | Information Leak Through XML External Entity File Disclosure |
4% (2) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
4% (2) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
2% (1) | CWE-682 | Incorrect Calculation |
2% (1) | CWE-669 | Incorrect Resource Transfer Between Spheres |
2% (1) | CWE-476 | NULL Pointer Dereference |
2% (1) | CWE-434 | Unrestricted Upload of File with Dangerous Type |
2% (1) | CWE-426 | Untrusted Search Path |
2% (1) | CWE-416 | Use After Free |
2% (1) | CWE-384 | Session Fixation |
2% (1) | CWE-352 | Cross-Site Request Forgery (CSRF) |
2% (1) | CWE-321 | Use of Hard-coded Cryptographic Key |
2% (1) | CWE-312 | Cleartext Storage of Sensitive Information |
2% (1) | CWE-287 | Improper Authentication |
2% (1) | CWE-276 | Incorrect Default Permissions |
2% (1) | CWE-121 | Stack-based Buffer Overflow |
2% (1) | CWE-88 | Argument Injection or Modification |
2% (1) | CWE-77 | Improper Sanitization of Special Elements used in a Command ('Comma... |
2% (1) | CWE-59 | Improper Link Resolution Before File Access ('Link Following') |
Snort® IPS/IDS
Date | Description |
---|---|
2020-10-15 | Pulse Connect Secure SSL VPN command injection attempt RuleID : 55640 - Type : SERVER-WEBAPP - Revision : 1 |
2020-10-15 | Pulse Connect Secure SSL VPN command injection attempt RuleID : 55639 - Type : SERVER-WEBAPP - Revision : 1 |
2020-10-15 | Pulse Connect Secure SSL VPN command injection attempt RuleID : 55638 - Type : SERVER-WEBAPP - Revision : 1 |
2020-10-15 | Pulse Connect Secure SSL VPN command injection attempt RuleID : 55637 - Type : SERVER-WEBAPP - Revision : 1 |
2019-10-10 | NFS server /etc/passwd symlink creation attempt RuleID : 51478 - Type : SERVER-OTHER - Revision : 1 |
2019-10-10 | NFS server /etc/passwd symlink creation attempt RuleID : 51476 - Type : SERVER-OTHER - Revision : 1 |
2019-10-10 | Pulse Secure Connect VPN post-auth hc.cgi buffer overflow attempt RuleID : 51453 - Type : SERVER-WEBAPP - Revision : 1 |
2019-10-01 | Pulse Secure SSL VPN version check attempt RuleID : 51390 - Type : SERVER-WEBAPP - Revision : 2 |
2019-09-26 | Pulse Secure SSL VPN directory traversal attempt RuleID : 51289 - Type : SERVER-WEBAPP - Revision : 1 |
2019-09-26 | Pulse Secure SSL VPN arbitrary file read attempt RuleID : 51288 - Type : SERVER-WEBAPP - Revision : 2 |
2019-09-24 | Pulse Secure VPN command injection attempt RuleID : 51243 - Type : SERVER-WEBAPP - Revision : 1 |
2019-09-24 | Pulse Secure VPN command injection attempt RuleID : 51242 - Type : SERVER-WEBAPP - Revision : 1 |
2019-09-24 | Pulse Secure VPN command injection attempt RuleID : 51241 - Type : SERVER-WEBAPP - Revision : 1 |
2019-09-24 | Pulse Secure VPN command injection attempt RuleID : 51240 - Type : SERVER-WEBAPP - Revision : 1 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2017-09-08 | Name: The remote device is missing a vendor-supplied security patch. File: junos_pulse_sa_40793.nasl - Type: ACT_GATHER_INFO |
2017-09-08 | Name: The remote device is missing a vendor-supplied security patch. File: pulse_policy_secure-sa-40793.nasl - Type: ACT_GATHER_INFO |