SB2024111422 - Multiple vulnerabilities in Ivanti Connect Secure and Policy Secure



SB2024111422 - Multiple vulnerabilities in Ivanti Connect Secure and Policy Secure

Published: November 14, 2024

Security Bulletin ID SB2024111422
Severity
Medium
Patch available
YES
Number of vulnerabilities 18
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 44% Low 56%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 18 secuirty vulnerabilities.


1) Stack-based buffer overflow (CVE-ID: CVE-2024-47905)

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error. A remote privileged user can trigger a stack-based buffer overflow and perform a denial of service (DoS) attack.


2) Out-of-bounds read (CVE-ID: CVE-2024-37400)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition. A remote non-authenticated attacker can send a specially crafted request, trigger an out-of-bounds read error and perform a denial of service (DoS) attack.


3) Use-after-free (CVE-ID: CVE-2024-9420)

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to a use-after-free error. A remote user can send specially crafted request to the system and perform a denial of service (DoS) attack.



4) Untrusted search path (CVE-ID: CVE-2024-47906)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to usage of an untrusted search path. A local user can place a malicious binary into a specific location on the system and execute arbitrary code with escalated privileges.


5) Stack-based buffer overflow (CVE-ID: CVE-2024-47907)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in IPSec. A remote unauthenticated attacker can send a specially crafted request to the system, trigger a stack-based buffer overflow and perform a denial of service (DoS) attack.


6) Stack-based buffer overflow (CVE-ID: CVE-2024-47909)

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error. A remote authenticated user can send a specially crafted request to the system, trigger a stack-based buffer overflow and perform a denial of service (DoS) attack.


7) NULL pointer dereference (CVE-ID: CVE-2024-8495)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error. A remote attacker can send specially crafted request to the system and perform a denial of service (DoS) attack.


8) Out-of-bounds write (CVE-ID: CVE-2024-38649)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in IPsec implementation. A remote attacker can send a specially crafted request to the system, trigger an out-of-bounds write and perform a denial of service (DoS) attack.


9) Improper neutralization of argument delimiters in a command (CVE-ID: CVE-2024-38655)

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation. A local privileged user can pass a specially crafted arguments to a CLI and execute arbitrary code on the system.


10) Improper neutralization of argument delimiters in a command (CVE-ID: CVE-2024-38656)

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation. A local privileged user can pass a specially crafted arguments to a CLI and execute arbitrary code on the system.


11) Incorrect default permissions (CVE-ID: CVE-2024-39709)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to incorrect default permissions for files and folders that are set by the application. A local user with access to the system can view contents of files and directories or modify them.


12) Improper neutralization of argument delimiters in a command (CVE-ID: CVE-2024-39710)

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation. A local privileged user can pass a specially crafted arguments to a CLI and execute arbitrary code on the system.


13) Improper neutralization of argument delimiters in a command (CVE-ID: CVE-2024-39711)

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation. A local privileged user can pass a specially crafted arguments to a CLI and execute arbitrary code on the system.


14) Improper neutralization of argument delimiters in a command (CVE-ID: CVE-2024-39712)

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation. A local privileged user can pass a specially crafted arguments to a CLI and execute arbitrary code on the system.


15) OS Command Injection (CVE-ID: CVE-2024-11007)

The vulnerability allows a remote user to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation. A remote privileged user can send a specially crafted HTTP request and execute arbitrary OS commands on the target system.


16) OS Command Injection (CVE-ID: CVE-2024-11006)

The vulnerability allows a remote user to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation. A remote privileged user can send a specially crafted HTTP request and execute arbitrary OS commands on the target system.


17) OS Command Injection (CVE-ID: CVE-2024-11005)

The vulnerability allows a remote user to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation. A remote privileged user can send a specially crafted HTTP request and execute arbitrary OS commands on the target system.


18) Cross-site scripting (CVE-ID: CVE-2024-11004)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


Remediation

Install update from vendor's website.