Lucene search

K
cveHackeroneCVE-2024-22052
HistoryApr 04, 2024 - 8:15 p.m.

CVE-2024-22052

2024-04-0420:15:08
CWE-476
hackerone
web.nvd.nist.gov
33
20
cve-2024-22052
ivanti
connect secure
ipsec
null pointer dereference
vulnerability
unauthenticated user
crafted requests
dos attack
nvd

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.8

Confidence

Low

EPSS

0.001

Percentile

17.0%

A null pointer dereference vulnerability in IPSec component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure allows an unauthenticated malicious user to send specially crafted requests in-order-to crash the service thereby causing a DoS attack

Affected configurations

Nvd
Vulners
Vulnrichment
Node
ivanticonnect_secureMatch9.1r1
OR
ivanticonnect_secureMatch9.1r10
OR
ivanticonnect_secureMatch9.1r11
OR
ivanticonnect_secureMatch9.1r11.5
OR
ivanticonnect_secureMatch9.1r12
OR
ivanticonnect_secureMatch9.1r13
OR
ivanticonnect_secureMatch9.1r14lts
OR
ivanticonnect_secureMatch9.1r15
OR
ivanticonnect_secureMatch9.1r16
OR
ivanticonnect_secureMatch9.1r17
OR
ivanticonnect_secureMatch9.1r18
OR
ivanticonnect_secureMatch9.1r2
OR
ivanticonnect_secureMatch9.1r3
OR
ivanticonnect_secureMatch9.1r4
OR
ivanticonnect_secureMatch9.1r4.1
OR
ivanticonnect_secureMatch9.1r4.2
OR
ivanticonnect_secureMatch9.1r4.3
OR
ivanticonnect_secureMatch9.1r5
OR
ivanticonnect_secureMatch9.1r6
OR
ivanticonnect_secureMatch9.1r7
OR
ivanticonnect_secureMatch9.1r8
OR
ivanticonnect_secureMatch9.1r9
OR
ivanticonnect_secureMatch22.1
OR
ivanticonnect_secureMatch22.2
OR
ivanticonnect_secureMatch22.3
OR
ivanticonnect_secureMatch22.4
OR
ivanticonnect_secureMatch22.5
OR
ivanticonnect_secureMatch22.6
OR
ivantipolicy_secureMatch9.0-
OR
ivantipolicy_secureMatch9.0r1
OR
ivantipolicy_secureMatch9.0r2
OR
ivantipolicy_secureMatch9.0r2.1
OR
ivantipolicy_secureMatch9.0r3
OR
ivantipolicy_secureMatch9.0r3.1
OR
ivantipolicy_secureMatch9.0r4
OR
ivantipolicy_secureMatch9.1-
OR
ivantipolicy_secureMatch9.1r1
OR
ivantipolicy_secureMatch9.1r10
OR
ivantipolicy_secureMatch9.1r11
OR
ivantipolicy_secureMatch9.1r12
OR
ivantipolicy_secureMatch9.1r13
OR
ivantipolicy_secureMatch9.1r14
OR
ivantipolicy_secureMatch9.1r15
OR
ivantipolicy_secureMatch9.1r16
OR
ivantipolicy_secureMatch9.1r17
OR
ivantipolicy_secureMatch9.1r18
OR
ivantipolicy_secureMatch9.1r2
OR
ivantipolicy_secureMatch9.1r3
OR
ivantipolicy_secureMatch9.1r4
OR
ivantipolicy_secureMatch9.1r5
OR
ivantipolicy_secureMatch9.1r6
OR
ivantipolicy_secureMatch9.1r7
OR
ivantipolicy_secureMatch9.1r8
OR
ivantipolicy_secureMatch9.1r9
OR
ivantipolicy_secureMatch22.1
OR
ivantipolicy_secureMatch22.2
OR
ivantipolicy_secureMatch22.3
OR
ivantipolicy_secureMatch22.4
OR
ivantipolicy_secureMatch22.5
OR
ivantipolicy_secureMatch22.6
VendorProductVersionCPE
ivanticonnect_secure9.1cpe:2.3:a:ivanti:connect_secure:9.1:r1:*:*:*:*:*:*
ivanticonnect_secure9.1cpe:2.3:a:ivanti:connect_secure:9.1:r10:*:*:*:*:*:*
ivanticonnect_secure9.1cpe:2.3:a:ivanti:connect_secure:9.1:r11:*:*:*:*:*:*
ivanticonnect_secure9.1cpe:2.3:a:ivanti:connect_secure:9.1:r11.5:*:*:*:*:*:*
ivanticonnect_secure9.1cpe:2.3:a:ivanti:connect_secure:9.1:r12:*:*:*:*:*:*
ivanticonnect_secure9.1cpe:2.3:a:ivanti:connect_secure:9.1:r13:*:*:*:*:*:*
ivanticonnect_secure9.1cpe:2.3:a:ivanti:connect_secure:9.1:r14:*:*:lts:*:*:*
ivanticonnect_secure9.1cpe:2.3:a:ivanti:connect_secure:9.1:r15:*:*:*:*:*:*
ivanticonnect_secure9.1cpe:2.3:a:ivanti:connect_secure:9.1:r16:*:*:*:*:*:*
ivanticonnect_secure9.1cpe:2.3:a:ivanti:connect_secure:9.1:r17:*:*:*:*:*:*
Rows per page:
1-10 of 601

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "vendor": "Ivanti",
    "product": "Connect Secure",
    "versions": [
      {
        "version": "22.1R6.2",
        "status": "affected",
        "lessThan": "22.1R6.2",
        "versionType": "semver"
      },
      {
        "version": "22.2R4.2",
        "status": "affected",
        "lessThan": "22.2R4.2",
        "versionType": "semver"
      },
      {
        "version": "22.3R1.2",
        "status": "affected",
        "lessThan": "22.3R1.2",
        "versionType": "semver"
      },
      {
        "version": "22.4R1.2",
        "status": "affected",
        "lessThan": "22.4R1.2",
        "versionType": "semver"
      },
      {
        "version": "22.4R2.4",
        "status": "affected",
        "lessThan": "22.4R2.4",
        "versionType": "semver"
      },
      {
        "version": "22.5R1.3",
        "status": "affected",
        "lessThan": "22.5R1.3",
        "versionType": "semver"
      },
      {
        "version": "22.5R2.4",
        "status": "affected",
        "lessThan": "22.5R2.4",
        "versionType": "semver"
      },
      {
        "version": "22.6R2.3",
        "status": "affected",
        "lessThan": "22.6R2.3",
        "versionType": "semver"
      },
      {
        "version": "9.1R14.6",
        "status": "affected",
        "lessThan": "9.1R14.6",
        "versionType": "semver"
      },
      {
        "version": "9.1R15.4",
        "status": "affected",
        "lessThan": "9.1R15.4",
        "versionType": "semver"
      },
      {
        "version": "9.1R16.4",
        "status": "affected",
        "lessThan": "9.1R16.4",
        "versionType": "semver"
      },
      {
        "version": "9.1R17.4",
        "status": "affected",
        "lessThan": "9.1R17.4",
        "versionType": "semver"
      },
      {
        "version": "9.1R18.5",
        "status": "affected",
        "lessThan": "9.1R18.5",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "vendor": "Ivanti",
    "product": "Policy Secure",
    "versions": [
      {
        "version": "22.4R1.2",
        "status": "affected",
        "lessThan": "22.4R1.2",
        "versionType": "semver"
      },
      {
        "version": "22.5R1.3",
        "status": "affected",
        "lessThan": "22.5R1.3",
        "versionType": "semver"
      },
      {
        "version": "22.6R1.2",
        "status": "affected",
        "lessThan": "22.6R1.2",
        "versionType": "semver"
      },
      {
        "version": "9.1R16.4",
        "status": "affected",
        "lessThan": "9.1R16.4",
        "versionType": "semver"
      },
      {
        "version": "9.1R17.4",
        "status": "affected",
        "lessThan": "9.1R17.4",
        "versionType": "semver"
      },
      {
        "version": "9.1R18.5",
        "status": "affected",
        "lessThan": "9.1R18.5",
        "versionType": "semver"
      }
    ]
  }
]

Social References

More

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.8

Confidence

Low

EPSS

0.001

Percentile

17.0%

Related for CVE-2024-22052