CVE ID
CVE-2023-46805
Vulnerability Name
Ivanti Connect Secure and Policy Secure Authentication Bypass Vulnerability
- Project: Ivanti
- Product: Connect Secure and Policy Secure
Date
- Date Added: 2024-01-10
- Due Date: 2024-01-22
Description
Ivanti Connect Secure (ICS, formerly known as Pulse Connect Secure) and Ivanti Policy Secure gateways contain an authentication bypass vulnerability in the web component that allows an attacker to access restricted resources by bypassing control checks. This vulnerability can be leveraged in conjunction with CVE-2024-21887, a command injection vulnerability.
Known To Be Used in Ransomware Campaigns?
Unknown
Action
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Additional Notes
Please apply mitigations per vendor instructions. For more information, please see: https://forums.ivanti.com/s/article/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2023-46805
Related Security News
- Salt Typhoon Exploits Flaws in Edge Network Devices to Breach 600 Organizations Worldwide
- Salt Typhoon Exploits Cisco, Ivanti, Palo Alto Flaws to Breach 600 Organizations Worldwide
- Google Reports 75 Zero-Days Exploited in 2024 — 44% Targeted Enterprise Security Products
- Mustang Panda Targets Myanmar With StarProxy, EDR Bypass, and TONESHELL Updates
- Ivanti VPN customers targeted via unrecognized RCE vulnerability (CVE-2025-22457)
- Ivanti patches Connect Secure zero-day exploited since mid-March
- Chinese Hackers Use GHOSTSPIDER Malware to Hack Telecoms Across 12+ Countries
- Salt Typhoon hackers backdoor telcos with new GhostSpider malware
- Ivanti fixes maximum severity RCE bug in Endpoint Management software
- Ivanti warns of critical vTM auth bypass with public exploit
Top comments (0)