Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 23 Sep 2025 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:a:ivanti:connect_secure:22.7:-:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:22.7:r1.1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:22.7:r1.2:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:22.7:r1.3:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:22.7:r1.4:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:22.7:r1.5:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:22.7:r1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:22.7:r2.1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:22.7:r2:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r10.2:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r10:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r11.0:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r11.1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r11.3:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r11.4:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r11.5:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r11:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r12.1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r12.2:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r12:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r13.1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r13:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r14.4:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r14:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r15.2:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r15:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r16.1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r16:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r17.1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r17.2:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r17:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r18.1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r18.2:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r18.3:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r18.7:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r18.8:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r18:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r2:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r3:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r4.1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r4.2:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r4.3:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r4:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r5:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r6:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r7:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r8.1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r8.2:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r8.4:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r8:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r9.1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r9.2:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r9:*:*:*:*:*:* cpe:2.3:a:ivanti:policy_secure:22.7:-:*:*:*:*:*:* cpe:2.3:a:ivanti:policy_secure:22.7:r1:*:*:*:*:*:* |
|
Metrics |
cvssV3_1
|
Mon, 21 Oct 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Ivanti
Ivanti connect Secure Ivanti policy Secure |
|
CPEs | cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:* cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Ivanti
Ivanti connect Secure Ivanti policy Secure |
|
Metrics |
ssvc
|
Fri, 18 Oct 2024 23:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Improper Input Validation in the admin portal of Ivanti Connect Secure before 22.7R2.1 and 9.1R18.9, or Ivanti Policy Secure before 22.7R1.1 allows a remote authenticated attacker to achieve remote code execution. | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-10-21T17:22:47.072Z
Reserved: 2024-06-08T01:04:07.093Z
Link: CVE-2024-37404

Updated: 2024-10-21T17:22:36.364Z

Status : Analyzed
Published: 2024-10-18T23:15:03.580
Modified: 2025-09-23T02:10:06.103
Link: CVE-2024-37404

No data.

No data.