- Description
- An OS command injection vulnerability in the admin web console of Ivanti CSA before version 5.0.2 allows a remote authenticated attacker with admin privileges to obtain remote code execution.
- Source
- 3c1d8aa1-5a33-4ea4-8992-aadd6440af75
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 7.2
- Impact score
- 5.9
- Exploitability score
- 1.2
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
Data from CISA
- Vulnerability name
- Ivanti Cloud Services Appliance (CSA) OS Command Injection Vulnerability
- Exploit added on
- Oct 9, 2024
- Exploit action due
- Oct 30, 2024
- Required action
- As Ivanti CSA 4.6.x has reached End-of-Life status, users are urged to remove CSA 4.6.x from service or upgrade to the 5.0.x line, or later, of supported solution.
- Hype score
- Not currently trending
This week, @CISAgov shared a writeup on the exploitation of CVE-2024-8963, an admin bypass vulnerability; CVE-2024-9379, a SQLi vulnerability; and CVE-2024-8190 and CVE-2024-9380, RCE vulnerabilities in #Ivanti CSA: https://t.co/2OW61ExzhC. ➡️ Ivanti CVE-2024-8963 has been… http
@Horizon3ai
24 Jan 2025
10 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
Cyberattackers are exploiting critical Ivanti CSA vulnerabilities (CVE-2024-8963, CVE-2024-9379, CVE-2024-8190, CVE-2024-9380) for admin bypass and remote code execution. Stay vigilant! ⚠️ #Ivanti #CISA #USA link: https://t.co/XTjLTwDCfM https://t.co/zpLdyydE69
@TweetThreatNews
23 Jan 2025
34 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
#threatreport #HighCompleteness Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications | 22-01-2025 Source: https://t.co/ndj3LPe8KK Key details below ↓ 💀Threats: Landesk_tool, Timestomp_technique, 🔓CVEs: CVE-2024-9380… https://t.co/4mHKdAY3vD https://t.co/
@rst_cloud
23 Jan 2025
36 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CISA and FBI warn of active exploitation of four critical vulnerabilities in Ivanti Cloud Service Appliances (CVE-2024-8963, CVE-2024-9379, CVE-2024-8190, CVE-2024-9380). Stay updated! 🔒 #Ivanti #USA #CyberAlert link: https://t.co/ofFIUEQzPv https://t.co/L8MF8545L9
@TweetThreatNews
23 Jan 2025
42 Impressions
1 Retweet
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-9380 alert 🚨 Ivanti CSA OS Command Injection Vulnerability : (CVSS score: 7.2/10) Update to version 5.0.2 or later to prevent authenticated admins from executing remote code. The vulnerability is actively exploited in the wild. Our customers assets are protected. 🦉 h
@Patrowl_io
23 Oct 2024
43 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-43573 is getting exploited #inthewild. Find out more at https://t.co/iXgTYADn4B CVE-2024-43572 is getting exploited #inthewild. Find out more at https://t.co/3fNkZBuraP CVE-2024-9380 is getting exploited #inthewild. Find out more at https://t.co/Ibnt21MaDk
@inthewildio
23 Oct 2024
49 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ivanti:endpoint_manager_cloud_services_appliance:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B633ABF6-4CAD-462D-B6C9-F209D90EAFD9",
"versionEndExcluding": "5.0.2"
}
],
"operator": "OR"
}
]
}
]