CVE-2024-7593
CRITICAL KEV NUCLEIIvanti Virtual Traffic Manager Authentication Bypass (CVE-2024-7593)
Title source: metasploitDescription
Incorrect implementation of an authentication algorithm in Ivanti vTM other than versions 22.2R1 or 22.7R2 allows a remote unauthenticated attacker to bypass authentication of the admin panel.
Exploits (5)
nomisec
WORKING POC
9 stars
by D3N14LD15K · remote
https://github.com/D3N14LD15K/CVE-2024-7593_PoC_Exploit
metasploit
WORKING POC
by Michael Heinzl, ohnoisploited, mxalias · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/http/ivanti_vtm_admin.rb
Nuclei Templates (1)
Ivanti vTM - Authentication Bypass
CRITICALVERIFIEDby gy741
Shodan:
http.favicon.hash:1862800928 || html:"apps/zxtm/login.cgi"
Scores
CVSS v3
9.8
EPSS
0.9444
EPSS Percentile
100.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitation Intel
CISA KEV
2024-09-24
VulnCheck KEV
2024-08-06
InTheWild.io
2024-08-19
ENISA EUVD
EUVD-2024-48489
Classification
CWE
CWE-287
CWE-303
Status
published
Affected Products (6)
ivanti/virtual_traffic_management
ivanti/virtual_traffic_management
ivanti/virtual_traffic_management
ivanti/virtual_traffic_management
ivanti/virtual_traffic_management
ivanti/virtual_traffic_management
Timeline
Published
Aug 13, 2024
KEV Added
Sep 24, 2024
Tracked Since
Feb 18, 2026