A code injection vulnerability in the Ivanti EPM Cloud Services Appliance (CSA) allows an unauthenticated user to execute arbitrary code with limited permissions (nobody).
https://veriti.ai/blog/vulnerable-villain-when-hackers-get-hacked/
https://www.crowdstrike.com/blog/anatomy-of-alpha-spider-ransomware/
https://forums.ivanti.com/s/article/SA-2021-12-02?language=en_US
https://forums.ivanti.com/s/article/SA-2021-12-02
http://packetstormsecurity.com/files/170590/Ivanti-Cloud-Services-Appliance-CSA-Command-Injection.html
http://packetstormsecurity.com/files/166383/Ivanti-Endpoint-Manager-CSA-4.5-4.6-Remote-Code-Execution.html
Source: Mitre, NVD
Published: 2021-12-08
Updated: 2025-03-13
Known Exploited Vulnerability (KEV)
Base Score: 7.5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
Severity: High
Base Score: 9.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: Critical
EPSS: 0.94461