SB2024040440 - Multiple vulnerabilities in Ivanti Connect Secure and Ivanti Policy Secure gateways 



SB2024040440 - Multiple vulnerabilities in Ivanti Connect Secure and Ivanti Policy Secure gateways

Published: April 4, 2024

Security Bulletin ID SB2024040440
Severity
High
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 25% Medium 75%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Heap-based buffer overflow (CVE-ID: CVE-2024-21894)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the IPSec component. A remote attacker can send specially crafted packets to the device, trigger a heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


2) NULL pointer dereference (CVE-ID: CVE-2024-22052)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error within the in IPSec component. A remote attacker can pass specially crafted packets to the device and perform a denial of service (DoS) attack.


3) Heap-based buffer overflow (CVE-ID: CVE-2024-22053)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error within the in IPSec component. A remote attacker can pass specially crafted packets to the device, trigger a heap-based buffer overflow and crash the system or red parts of system memory.


4) XML External Entity injection (CVE-ID: CVE-2024-22023)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied XML input within the SAML component. A remote attacker can pass a specially crafted XML data to the system and cause resource exhaustion thereby resulting in a limited-time DoS.


Remediation

Install update from vendor's website.