
Cloud Vulnerability DB
A community-led vulnerabilities database
A stack-based buffer overflow vulnerability (CVE-2024-47905) affects Ivanti Connect Secure before version 22.7R2.3 and Ivanti Policy Secure before version 22.7R1.2. The vulnerability was disclosed on November 12, 2024, and allows remote authenticated attackers with admin privileges to cause a denial of service (NVD).
The vulnerability is classified as a stack-based buffer overflow (CWE-121) and out-of-bounds write (CWE-787). It has been assigned a CVSS v3.1 base score of 4.9 (MEDIUM) with the following vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H. The vulnerability requires high privileges and no user interaction for exploitation (NVD).
When successfully exploited, the vulnerability can lead to denial of service conditions in affected Ivanti Connect Secure and Policy Secure systems. The impact is primarily focused on system availability, with no direct impact on confidentiality or integrity (SecurityOnline).
Organizations should upgrade to Ivanti Connect Secure version 22.7R2.3 or later, and Ivanti Policy Secure version 22.7R1.2 or later to address this vulnerability (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."