CVE-2024-22024

8.3 HIGH

📋 TL;DR

This XXE vulnerability in Ivanti's SAML implementation allows attackers to access restricted resources without authentication by processing malicious XML entities. It affects Ivanti Connect Secure, Ivanti Policy Secure, and ZTA gateways. Attackers can potentially read files from the server or perform server-side request forgery.

💻 Affected Systems

Products:
  • Ivanti Connect Secure
  • Ivanti Policy Secure
  • ZTA gateways
Versions: 9.x, 22.x
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments using SAML authentication are affected; requires XML parsing functionality

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via file disclosure leading to credential theft, lateral movement, and data exfiltration

🟠

Likely Case

Unauthenticated access to sensitive files, configuration data, or internal network resources

🟢

If Mitigated

Limited impact if XML parsing is disabled or properly configured with entity restrictions

🌐 Internet-Facing: HIGH - Affected gateways are typically internet-facing and vulnerable to unauthenticated attacks
🏢 Internal Only: MEDIUM - Internal systems could be targeted via phishing or compromised internal hosts

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

XXE vulnerabilities are well-understood with many existing tools; unauthenticated nature makes exploitation straightforward

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Ivanti security advisory for specific patched versions

Vendor Advisory: https://forums.ivanti.com/s/article/CVE-2024-22024-XXE-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure?language=en_US

Restart Required: Yes

Instructions:

1. Download latest patch from Ivanti support portal 2. Backup configuration 3. Apply patch following vendor instructions 4. Restart services 5. Verify SAML functionality

🔧 Temporary Workarounds

Disable XML external entity processing

all

Configure XML parser to disallow external entity resolution

Configuration varies by platform - consult Ivanti documentation for XML parser hardening

Network segmentation

all

Restrict access to SAML endpoints from untrusted networks

firewall rules to limit SAML endpoint access to trusted identity providers only

🧯 If You Can't Patch

  • Implement WAF rules to block XXE patterns in XML requests
  • Monitor for unusual XML payloads and file access attempts

🔍 How to Verify

Check if Vulnerable:

Check if system is running affected versions and has SAML enabled

Check Version:

Check Ivanti admin interface or use vendor-specific CLI commands

Verify Fix Applied:

Verify patch version is installed and test XXE payloads are rejected

📡 Detection & Monitoring

Log Indicators:

  • Unusual XML parsing errors
  • File access attempts via XML entities
  • SAML authentication failures with malformed XML

Network Indicators:

  • XML payloads with DOCTYPE declarations
  • External entity references in SAML requests
  • Unusual outbound connections from gateway

SIEM Query:

source="ivanti_gateway" AND (message="*DOCTYPE*" OR message="*ENTITY*" OR message="*XXE*")

🔗 References

📤 Share & Export