CVE-2024-21888

high

Description

A privilege escalation vulnerability in web component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows a user to elevate privileges to that of an administrator.

References

https://securelist.com/vulnerability-report-q1-2024/112554/

https://www.bleepingcomputer.com/news/security/magnet-goblin-hackers-use-1-day-flaws-to-drop-custom-linux-malware/

https://research.checkpoint.com/2024/magnet-goblin-targets-publicly-facing-servers-using-1-day-vulnerabilities/

https://www.hivepro.com/threat-advisory/ivanti-addresses-zero-day-vulnerability-exploited-in-attacks/

https://securityaffairs.com/158440/apt/malware-ivanti-vpn-flaws-attacks.html?web_view=true

https://arstechnica.com/security/2024/02/agencies-using-vulnerable-ivanti-products-have-until-saturday-to-disconnect-them/

https://securityaffairs.com/158440/apt/malware-ivanti-vpn-flaws-attacks.html

https://therecord.media/ivanti-warns-of-two-bugs-as-cisa-issues-alert-about-hackers?&web_view=true

https://www.tenable.com/blog/cve-2023-46805-cve-2024-21887-cve-2024-21888-and-cve-2024-21893-frequently-asked-questions

https://www.itworldcanada.com/article/warning-threat-actors-getting-around-some-ivanti-mitigations/557765

https://www.theregister.com/2024/01/31/ivanti_patches_zero_days/

https://www.bleepingcomputer.com/news/security/ivanti-warns-of-new-connect-secure-zero-day-exploited-in-attacks/

https://forums.ivanti.com/s/article/CVE-2024-21888-Privilege-Escalation-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure?language=en_US

https://forums.ivanti.com/s/article/CVE-2024-21888-Privilege-Escalation-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure?language=en_US

Details

Source: Mitre, NVD

Published: 2024-01-31

Updated: 2024-01-31

Risk Information

CVSS v2

Base Score: 9

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High