CVE-2024-47906

7.8 HIGH

📋 TL;DR

This vulnerability allows local authenticated attackers to escalate privileges on Ivanti Connect Secure and Policy Secure appliances. Attackers with existing local access can gain higher privileges than intended. Affected systems are Ivanti Connect Secure before 22.7R2.3 and Ivanti Policy Secure before 22.7R1.2, excluding 9.1Rx versions.

💻 Affected Systems

Products:
  • Ivanti Connect Secure
  • Ivanti Policy Secure
Versions: Connect Secure: versions before 22.7R2.3 (excluding 9.1Rx). Policy Secure: versions before 22.7R1.2 (excluding 9.1Rx).
Operating Systems: Ivanti appliance OS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects 22.x versions, not 9.1Rx versions. Requires local authenticated access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where an authenticated attacker gains root/administrator privileges, potentially leading to data theft, lateral movement, or persistence establishment.

🟠

Likely Case

Privilege escalation allowing attackers to bypass security controls, access sensitive configuration data, or modify system settings.

🟢

If Mitigated

Limited impact if proper access controls and monitoring are in place, though privilege escalation still poses significant risk.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local authenticated access. CWE-267 indicates improper privilege management.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Connect Secure: 22.7R2.3 or later. Policy Secure: 22.7R1.2 or later.

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Ivanti support portal. 2. Backup current configuration. 3. Apply patch following Ivanti documentation. 4. Restart appliance. 5. Verify patch installation and system functionality.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit local authenticated access to only trusted administrators and implement strict access controls.

Enhanced Monitoring

all

Implement enhanced logging and monitoring for privilege escalation attempts and unusual local account activity.

🧯 If You Can't Patch

  • Implement strict access controls to limit local authenticated users to only essential personnel.
  • Deploy network segmentation to isolate vulnerable appliances from critical systems.

🔍 How to Verify

Check if Vulnerable:

Check appliance version via web admin interface or CLI. For Connect Secure: version must be 22.7R2.3 or higher. For Policy Secure: version must be 22.7R1.2 or higher.

Check Version:

Via CLI: 'show version' or via web interface: System > Maintenance > Version Information

Verify Fix Applied:

Verify version after patch installation matches patched versions above. Check system logs for successful patch installation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation attempts
  • Multiple failed then successful authentication attempts from same local account
  • Changes to user privilege levels

Network Indicators:

  • Unusual outbound connections from appliance after local authentication events

SIEM Query:

source="ivanti_appliance" AND (event_type="privilege_escalation" OR user_privilege_change="true")

🔗 References

📤 Share & Export