CVE-2024-21887

CRITICAL KEV RANSOMWARE NUCLEI

Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) - Command Injection

Title source: nuclei

Description

A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.

Exploits (15)

nomisec WORKING POC 57 stars
by Chocapikk · remote
https://github.com/Chocapikk/CVE-2024-21887
github WORKING POC 26 stars
by Chocapikk · pythonremote
https://github.com/Chocapikk/CVE-2024-21893-to-CVE-2024-21887
nomisec WORKING POC 23 stars
by duy-31 · poc
https://github.com/duy-31/CVE-2023-46805_CVE-2024-21887
nomisec SCANNER 12 stars
by seajaysec · infoleak
https://github.com/seajaysec/Ivanti-Connect-Around-Scan
nomisec SCANNER 7 stars
by oways · infoleak
https://github.com/oways/ivanti-CVE-2024-21887
nomisec WORKING POC 5 stars
by Hexastrike · poc
https://github.com/Hexastrike/Ivanti-Connect-Secure-Logs-Parser
nomisec WORKING POC 5 stars
by raminkarimkhani1996 · poc
https://github.com/raminkarimkhani1996/CVE-2023-46805_CVE-2024-21887
nomisec TROJAN 2 stars
by tucommenceapousser · poc
https://github.com/tucommenceapousser/CVE-2024-21887
nomisec SCANNER 1 stars
by rxwx · poc
https://github.com/rxwx/pulse-meter
gitlab TROJAN
by mdelaclaire · poc
https://gitlab.com/mdelaclaire/CVE-2024-21887
nomisec WORKING POC
by pwniel · poc
https://github.com/pwniel/ivanti_shell
metasploit WORKING POC EXCELLENT
by sfewer-r7 · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/ivanti_connect_secure_rce_cve_2024_21893.rb
metasploit WORKING POC EXCELLENT
by sfewer-r7 · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/ivanti_connect_secure_rce_cve_2023_46805.rb
vulncheck_xdb WRITEUP
remote
https://github.com/7aRanchi/PublicPoC
vulncheck_xdb WORKING POC
remote
https://github.com/zwxxb/CVE-2024-21887

Nuclei Templates (1)

Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) - Command Injection
CRITICALby pdresearch,parthmalhotra,iamnoooob
Shodan: html:"welcome.cgi?p=logo" || http.title:"ivanti connect secure" || http.html:"welcome.cgi?p=logo"
FOFA: body="welcome.cgi?p=logo" || title="ivanti connect secure"

Scores

CVSS v3 9.1
EPSS 0.9441
EPSS Percentile 100.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Details

CISA KEV 2024-01-10
VulnCheck KEV 2024-01-10
InTheWild.io 2024-01-10
ENISA EUVD EUVD-2024-19498
Ransomware Use Confirmed
CWE
CWE-77
Status published
Products (10)
ivanti/connect_secure 9.0
ivanti/connect_secure 9.1 r1 (32 CPE variants)
ivanti/connect_secure 22.1 r1 (2 CPE variants)
ivanti/connect_secure 22.2 (2 CPE variants)
ivanti/connect_secure 22.3 r1
ivanti/connect_secure 22.4 r1 (2 CPE variants)
ivanti/connect_secure 22.5 r2.1
ivanti/connect_secure 22.6 (3 CPE variants)
ivanti/policy_secure 9.0
ivanti/policy_secure 9.1 r1 (5 CPE variants)
Published Jan 12, 2024
KEV Added Jan 10, 2024
Tracked Since Feb 18, 2026