CVE-2024-10630: CWE-366: Race Condition within a Thread in Ivanti Application Control Engine
A race condition in Ivanti Application Control Engine before version 10.14.4.0 allows a local authenticated attacker to bypass the application blocking functionality.
AI Analysis
Technical Summary
CVE-2024-10630 is a race condition vulnerability identified in Ivanti Application Control Engine, a security product designed to enforce application whitelisting and blocking policies on endpoints. The flaw exists in the threading implementation before version 10.14.4.0, where concurrent operations on application control enforcement can be manipulated by a local authenticated user. This race condition (CWE-366) allows an attacker with low-level privileges to bypass the application blocking functionality, effectively circumventing security policies intended to prevent unauthorized or malicious software execution. The vulnerability does not require user interaction but does require local authentication, meaning the attacker must have some level of access to the system. The CVSS v3.1 base score of 7.8 reflects high severity, with impacts rated high on confidentiality, integrity, and availability, indicating that successful exploitation could lead to unauthorized data access, modification, or denial of service. No public exploits or patches are currently available, but the vulnerability has been officially published and reserved since late 2024. Given the nature of the product, this vulnerability could be leveraged in targeted attacks against enterprise environments where Ivanti Application Control Engine is deployed to enforce endpoint security policies.
Potential Impact
The primary impact of CVE-2024-10630 is the bypass of application blocking controls, which undermines the core security function of Ivanti Application Control Engine. This can allow attackers to execute unauthorized or malicious applications, potentially leading to data breaches, malware deployment, lateral movement, or disruption of critical services. Since the vulnerability affects confidentiality, integrity, and availability, organizations could face severe operational and reputational damage. The requirement for local authenticated access limits remote exploitation but does not eliminate risk, especially in environments with many users or where attackers have gained initial footholds. Enterprises relying heavily on Ivanti for endpoint protection may find their defenses weakened, increasing the likelihood of successful attacks. The absence of known exploits in the wild suggests limited current exploitation, but the vulnerability’s characteristics make it a likely target for future attacks once exploit code becomes available.
Mitigation Recommendations
Organizations should implement the following specific mitigations: 1) Immediately restrict local user privileges to the minimum necessary, reducing the number of users who can authenticate locally. 2) Monitor endpoint logs and application control events for anomalies or unexpected application executions that could indicate exploitation attempts. 3) Employ additional endpoint detection and response (EDR) solutions to detect suspicious behavior that bypasses application control. 4) Segment networks and enforce strict access controls to limit lateral movement opportunities for attackers who gain local access. 5) Prepare to deploy Ivanti’s security update promptly once version 10.14.4.0 or later is released to address this vulnerability. 6) Conduct regular security awareness training to reduce the risk of attackers gaining initial local access. 7) Use multi-factor authentication and strong credential policies to prevent unauthorized local logins. These measures combined will reduce the attack surface and limit the potential impact until a patch is applied.
Affected Countries
United States, United Kingdom, Canada, Australia, Germany, Japan, France, Netherlands, Sweden, Switzerland
CVE-2024-10630: CWE-366: Race Condition within a Thread in Ivanti Application Control Engine
Description
A race condition in Ivanti Application Control Engine before version 10.14.4.0 allows a local authenticated attacker to bypass the application blocking functionality.
AI-Powered Analysis
Technical Analysis
CVE-2024-10630 is a race condition vulnerability identified in Ivanti Application Control Engine, a security product designed to enforce application whitelisting and blocking policies on endpoints. The flaw exists in the threading implementation before version 10.14.4.0, where concurrent operations on application control enforcement can be manipulated by a local authenticated user. This race condition (CWE-366) allows an attacker with low-level privileges to bypass the application blocking functionality, effectively circumventing security policies intended to prevent unauthorized or malicious software execution. The vulnerability does not require user interaction but does require local authentication, meaning the attacker must have some level of access to the system. The CVSS v3.1 base score of 7.8 reflects high severity, with impacts rated high on confidentiality, integrity, and availability, indicating that successful exploitation could lead to unauthorized data access, modification, or denial of service. No public exploits or patches are currently available, but the vulnerability has been officially published and reserved since late 2024. Given the nature of the product, this vulnerability could be leveraged in targeted attacks against enterprise environments where Ivanti Application Control Engine is deployed to enforce endpoint security policies.
Potential Impact
The primary impact of CVE-2024-10630 is the bypass of application blocking controls, which undermines the core security function of Ivanti Application Control Engine. This can allow attackers to execute unauthorized or malicious applications, potentially leading to data breaches, malware deployment, lateral movement, or disruption of critical services. Since the vulnerability affects confidentiality, integrity, and availability, organizations could face severe operational and reputational damage. The requirement for local authenticated access limits remote exploitation but does not eliminate risk, especially in environments with many users or where attackers have gained initial footholds. Enterprises relying heavily on Ivanti for endpoint protection may find their defenses weakened, increasing the likelihood of successful attacks. The absence of known exploits in the wild suggests limited current exploitation, but the vulnerability’s characteristics make it a likely target for future attacks once exploit code becomes available.
Mitigation Recommendations
Organizations should implement the following specific mitigations: 1) Immediately restrict local user privileges to the minimum necessary, reducing the number of users who can authenticate locally. 2) Monitor endpoint logs and application control events for anomalies or unexpected application executions that could indicate exploitation attempts. 3) Employ additional endpoint detection and response (EDR) solutions to detect suspicious behavior that bypasses application control. 4) Segment networks and enforce strict access controls to limit lateral movement opportunities for attackers who gain local access. 5) Prepare to deploy Ivanti’s security update promptly once version 10.14.4.0 or later is released to address this vulnerability. 6) Conduct regular security awareness training to reduce the risk of attackers gaining initial local access. 7) Use multi-factor authentication and strong credential policies to prevent unauthorized local logins. These measures combined will reduce the attack surface and limit the potential impact until a patch is applied.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- ivanti
- Date Reserved
- 2024-10-31T17:06:47.825Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a0a43885912abc71d61ad5
Added to database: 2/26/2026, 7:51:20 PM
Last enriched: 2/26/2026, 9:47:09 PM
Last updated: 2/26/2026, 11:16:37 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-3268: Improper Access Controls in psi-probe PSI Probe
MediumCVE-2026-28280: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in jmpsec osctrl
MediumCVE-2026-28279: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in jmpsec osctrl
HighCVE-2026-28276: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Morelitea initiative
HighCVE-2026-28275: CWE-613: Insufficient Session Expiration in Morelitea initiative
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.