CVE-2024-7593

CRITICAL KEV NUCLEI

Ivanti Virtual Traffic Manager Authentication Bypass (CVE-2024-7593)

Title source: metasploit

Description

Incorrect implementation of an authentication algorithm in Ivanti vTM other than versions 22.2R1 or 22.7R2 allows a remote unauthenticated attacker to bypass authentication of the admin panel.

Exploits (5)

nomisec WORKING POC 9 stars
by D3N14LD15K · remote
https://github.com/D3N14LD15K/CVE-2024-7593_PoC_Exploit
nomisec WRITEUP
by voidbroker · poc
https://github.com/voidbroker/CVE-2024-7593
nomisec SCANNER
by rxerium · poc
https://github.com/rxerium/CVE-2024-7593
metasploit WORKING POC
by Michael Heinzl, ohnoisploited, mxalias · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/http/ivanti_vtm_admin.rb
vulncheck_xdb WORKING POC
remote
https://github.com/0xlf/CVE-2024-7593

Nuclei Templates (1)

Ivanti vTM - Authentication Bypass
CRITICALVERIFIEDby gy741
Shodan: http.favicon.hash:1862800928 || html:"apps/zxtm/login.cgi"

Scores

CVSS v3 9.8
EPSS 0.9444
EPSS Percentile 100.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

CISA KEV 2024-09-24
VulnCheck KEV 2024-08-06
InTheWild.io 2024-08-19
ENISA EUVD EUVD-2024-48489

Classification

CWE
CWE-287 CWE-303
Status published

Affected Products (6)

ivanti/virtual_traffic_management
ivanti/virtual_traffic_management
ivanti/virtual_traffic_management
ivanti/virtual_traffic_management
ivanti/virtual_traffic_management
ivanti/virtual_traffic_management

Timeline

Published Aug 13, 2024
KEV Added Sep 24, 2024
Tracked Since Feb 18, 2026