A server-side request forgery vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) and Ivanti Neurons for ZTA allows an attacker to access certain restricted resources without authentication.
Published: 2024-01-31
Frequently asked questions for five CVEs affecting Ivanti Connect Secure and Policy Secure Gateways, with three of the vulnerabilities having been exploited in the wild as zero-days.
https://thehackernews.com/2025/03/over-400-ips-exploiting-multiple-ssrf.html
https://www.greynoise.io/blog/new-ssrf-exploitation-surge
https://securelist.com/vulnerabilities-and-exploits-in-q4-2024/115761/
https://securelist.com/vulnerability-report-q1-2024/112554/
https://unit42.paloaltonetworks.com/malware-initiated-scanning-attacks/
https://cloud.google.com/blog/topics/threat-intelligence/ivanti-post-exploitation-lateral-movement
https://www.assetnote.io/resources/research/ivantis-pulse-connect-secure-auth-bypass-round-two
Published: 2024-01-31
Updated: 2024-11-29
Known Exploited Vulnerability (KEV)
Base Score: 8.5
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:P/A:N
Severity: High
Base Score: 8.2
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
Severity: High
Base Score: 9.2
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:H/SI:L/SA:N
Severity: Critical
EPSS: 0.9432
Tenable Research has classified this CVE under the following Vulnerability Watch classification, which includes active and historical (inactive) classifications. You can learn more about these classifications on our blog.
Vulnerability of Concern