Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-10630: CWE-366: Race Condition within a Thread in Ivanti Application Control Engine

0
High
VulnerabilityCVE-2024-10630cvecve-2024-10630cwe-366
Published: Tue Jan 14 2025 (01/14/2025, 16:49:45 UTC)
Source: CVE Database V5
Vendor/Project: Ivanti
Product: Application Control Engine

Description

A race condition in Ivanti Application Control Engine before version 10.14.4.0 allows a local authenticated attacker to bypass the application blocking functionality.

AI-Powered Analysis

AILast updated: 02/26/2026, 21:47:09 UTC

Technical Analysis

CVE-2024-10630 is a race condition vulnerability identified in Ivanti Application Control Engine, a security product designed to enforce application whitelisting and blocking policies on endpoints. The flaw exists in the threading implementation before version 10.14.4.0, where concurrent operations on application control enforcement can be manipulated by a local authenticated user. This race condition (CWE-366) allows an attacker with low-level privileges to bypass the application blocking functionality, effectively circumventing security policies intended to prevent unauthorized or malicious software execution. The vulnerability does not require user interaction but does require local authentication, meaning the attacker must have some level of access to the system. The CVSS v3.1 base score of 7.8 reflects high severity, with impacts rated high on confidentiality, integrity, and availability, indicating that successful exploitation could lead to unauthorized data access, modification, or denial of service. No public exploits or patches are currently available, but the vulnerability has been officially published and reserved since late 2024. Given the nature of the product, this vulnerability could be leveraged in targeted attacks against enterprise environments where Ivanti Application Control Engine is deployed to enforce endpoint security policies.

Potential Impact

The primary impact of CVE-2024-10630 is the bypass of application blocking controls, which undermines the core security function of Ivanti Application Control Engine. This can allow attackers to execute unauthorized or malicious applications, potentially leading to data breaches, malware deployment, lateral movement, or disruption of critical services. Since the vulnerability affects confidentiality, integrity, and availability, organizations could face severe operational and reputational damage. The requirement for local authenticated access limits remote exploitation but does not eliminate risk, especially in environments with many users or where attackers have gained initial footholds. Enterprises relying heavily on Ivanti for endpoint protection may find their defenses weakened, increasing the likelihood of successful attacks. The absence of known exploits in the wild suggests limited current exploitation, but the vulnerability’s characteristics make it a likely target for future attacks once exploit code becomes available.

Mitigation Recommendations

Organizations should implement the following specific mitigations: 1) Immediately restrict local user privileges to the minimum necessary, reducing the number of users who can authenticate locally. 2) Monitor endpoint logs and application control events for anomalies or unexpected application executions that could indicate exploitation attempts. 3) Employ additional endpoint detection and response (EDR) solutions to detect suspicious behavior that bypasses application control. 4) Segment networks and enforce strict access controls to limit lateral movement opportunities for attackers who gain local access. 5) Prepare to deploy Ivanti’s security update promptly once version 10.14.4.0 or later is released to address this vulnerability. 6) Conduct regular security awareness training to reduce the risk of attackers gaining initial local access. 7) Use multi-factor authentication and strong credential policies to prevent unauthorized local logins. These measures combined will reduce the attack surface and limit the potential impact until a patch is applied.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ivanti
Date Reserved
2024-10-31T17:06:47.825Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0a43885912abc71d61ad5

Added to database: 2/26/2026, 7:51:20 PM

Last enriched: 2/26/2026, 9:47:09 PM

Last updated: 2/26/2026, 11:16:37 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses