Lucene search

K
nvd3c1d8aa1-5a33-4ea4-8992-aadd6440af75NVD:CVE-2024-8190
HistorySep 10, 2024 - 9:15 p.m.

CVE-2024-8190

2024-09-1021:15:14
CWE-78
3c1d8aa1-5a33-4ea4-8992-aadd6440af75
web.nvd.nist.gov
5
cve-2024-8190
os command injection
ivanti cloud services
remote code execution
admin privileges

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

EPSS

0.151

Percentile

95.9%

An OS command injection vulnerability in Ivanti Cloud Services Appliance versions 4.6 Patch 518 and before allows a remote authenticated attacker to obtain remote code execution. The attacker must have admin level privileges to exploit this vulnerability.

Affected configurations

Nvd
Node
ivanticloud_services_applianceMatch4.6-
OR
ivanticloud_services_applianceMatch4.6patch_518
VendorProductVersionCPE
ivanticloud_services_appliance4.6cpe:2.3:a:ivanti:cloud_services_appliance:4.6:-:*:*:*:*:*:*
ivanticloud_services_appliance4.6cpe:2.3:a:ivanti:cloud_services_appliance:4.6:patch_518:*:*:*:*:*:*

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

EPSS

0.151

Percentile

95.9%