Overview
- Description
- An OS command injection vulnerability in the admin web console of Ivanti CSA before version 5.0.2 allows a remote authenticated attacker with admin privileges to obtain remote code execution.
- Source
- 3c1d8aa1-5a33-4ea4-8992-aadd6440af75
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.2
- Impact score
- 5.9
- Exploitability score
- 1.2
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
Known exploits
Data from CISA
- Vulnerability name
- Ivanti Cloud Services Appliance (CSA) OS Command Injection Vulnerability
- Exploit added on
- Oct 9, 2024
- Exploit action due
- Oct 30, 2024
- Required action
- As Ivanti CSA 4.6.x has reached End-of-Life status, users are urged to remove CSA 4.6.x from service or upgrade to the 5.0.x line, or later, of supported solution.
Social media
- Hype score
- Not currently trending
CVE-2024-9380 alert 馃毃 Ivanti CSA OS Command Injection Vulnerability : (CVSS score: 7.2/10) Update to version 5.0.2 or later to prevent authenticated admins from executing remote code. The vulnerability is actively exploited in the wild. Our customers assets are protected. 馃 h
@Patrowl_io
23 Oct 2024
43 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-43573 is getting exploited #inthewild. Find out more at https://t.co/iXgTYADn4B CVE-2024-43572 is getting exploited #inthewild. Find out more at https://t.co/3fNkZBuraP CVE-2024-9380 is getting exploited #inthewild. Find out more at https://t.co/Ibnt21MaDk
@inthewildio
23 Oct 2024
49 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ivanti:endpoint_manager_cloud_services_appliance:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B633ABF6-4CAD-462D-B6C9-F209D90EAFD9", "versionEndExcluding": "5.0.2" } ], "operator": "OR" } ] } ]