Lucene search

K
vulnrichmentIvantiVULNRICHMENT:CVE-2024-8190
HistorySep 10, 2024 - 8:33 p.m.

CVE-2024-8190

2024-09-1020:33:44
CWE-78
ivanti
github.com
8
vulnerability
command injection
ivanti cloud services appliance
remote code execution
admin privileges

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

Low

EPSS

0.151

Percentile

95.9%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

An OS command injection vulnerability in Ivanti Cloud Services Appliance versions 4.6 Patch 518 and before allows a remote authenticated attacker to obtain remote code execution. The attacker must have admin level privileges to exploit this vulnerability.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:ivanti:endpoint_manager_cloud_services_appliance:*:*:*:*:*:*:*:*"
    ],
    "vendor": "ivanti",
    "product": "endpoint_manager_cloud_services_appliance",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "5.0",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

Low

EPSS

0.151

Percentile

95.9%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total