ivanti virtual-traffic-management CVE-2024-7593 is a vulnerability in Ivanti Virtual Traffic Management
Published on August 13, 2024

Incorrect implementation of an authentication algorithm in Ivanti vTM other than versions 22.2R1 or 22.7R2 allows a remote unauthenticated attacker to bypass authentication of the admin panel.

Vendor Advisory NVD

Known Exploited Vulnerability

This Ivanti Virtual Traffic Manager Authentication Bypass Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Ivanti Virtual Traffic Manager contains an authentication bypass vulnerability that allows a remote, unauthenticated attacker to create a chosen administrator account.

The following remediation steps are recommended / required by October 15, 2024: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Vulnerability Analysis

CVE-2024-7593 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. It has the highest possible exploitability rating (3.9). The potential impact of an exploit of this vulnerability is considered to be critical as this vulnerability has a high impact to the confidentiality, integrity and availability of this component.

What is an authentification Vulnerability?

When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.

CVE-2024-7593 has been classified to as an authentification vulnerability or weakness.


Products Associated with CVE-2024-7593

You can be notified by stack.watch whenever vulnerabilities like CVE-2024-7593 are published in these products:

 

What versions of Virtual Traffic Management are vulnerable to CVE-2024-7593?