CVE-2023-35080
HIGHIvanti Secure Access Client < 22.6 - Incorrect Default Permissions
Title source: ruleDescription
A vulnerability has been identified in the Ivanti Secure Access Windows client, which could allow a locally authenticated attacker to exploit a vulnerable configuration, potentially leading to various security risks, including the escalation of privileges, denial of service, or information disclosure.
Exploits (2)
nomisec
WORKING POC
2 stars
by tijme · poc
https://github.com/tijme/ivanti-cve-2023-35080-privilege-escalation-bof
nomisec
WORKING POC
1 stars
by HopHouse · poc
https://github.com/HopHouse/Ivanti-Pulse_VPN-Client_Exploit-CVE-2023-35080_Privilege-escalation
References (1)
Core 1
Core References
Scores
CVSS v3
7.8
EPSS
0.0054
EPSS Percentile
67.7%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-276
Status
published
Products (2)
ivanti/secure_access_client
22.6 r1
ivanti/secure_access_client
< 22.6
Published
Nov 15, 2023
Tracked Since
Feb 18, 2026