HomeVulnerabilityIvanti Points Important Safety Updates for CSA and Join Safe Vulnerabilities

Ivanti Points Important Safety Updates for CSA and Join Safe Vulnerabilities

Ivanti has launched security updates to deal with a number of important flaws in its Cloud Providers Software (CSA) and Join Safe merchandise that would result in privilege escalation and code execution.

The listing of vulnerabilities is as follows –

  • CVE-2024-11639 (CVSS rating: 10.0) – An authentication bypass vulnerability within the admin net console of Ivanti CSA earlier than 5.0.3 that enables a distant unauthenticated attacker to realize administrative entry
  • CVE-2024-11772 (CVSS rating: 9.1) – A command injection vulnerability within the admin net console of Ivanti CSA earlier than model 5.0.3 that enables a distant authenticated attacker with admin privileges to attain distant code execution
  • CVE-2024-11773 (CVSS rating: 9.1) – An SQL injection vulnerability within the admin net console of Ivanti CSA earlier than model 5.0.3 that enables a distant authenticated attacker with admin privileges to run arbitrary SQL statements
  • CVE-2024-11633 (CVSS rating: 9.1) – An argument injection vulnerability in Ivanti Join Safe earlier than model 22.7R2.4 that enables a distant authenticated attacker with admin privileges to attain distant code execution
  • CVE-2024-11634 (CVSS rating: 9.1) – A command injection vulnerability in Ivanti Join Safe earlier than model 22.7R2.3 and Ivanti Coverage Safe earlier than model 22.7R1.2 that enables a distant authenticated attacker with admin privileges to attain distant code execution
  • CVE-2024-8540 (CVSS rating: 8.8) – An insecure permissions vulnerability in Ivanti Sentry earlier than variations 9.20.2 and 10.0.2 or 10.1.0 that enables a neighborhood authenticated attacker to change delicate software parts
Cybersecurity

The shortcomings have been addressed within the under variations –

  • Ivanti Cloud Providers Software 5.0.3
  • Ivanti Join Safe 22.7R2.4
  • Ivanti Coverage Safe 22.7R1.2
  • Ivanti Sentry 9.20.2, 10.0.2, and 10.1.0
See also  Past the desk stakes: CISO Ian Schneller on cybersecurity’s evolving position

Whereas Ivanti has emphasised that it isn’t conscious of energetic exploitation of any of the aforementioned flaws, it is crucial that customers take fast motion provided that a number of flaws in its merchandise have been abused by state-sponsored attackers for malicious actions.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular