CVE-2024-10644: CWE-94 Improper Control of Generation of Code ('Code Injection') in Ivanti Connect Secure
CVE-2024-10644 is a critical code injection vulnerability in Ivanti Connect Secure and Ivanti Policy Secure products prior to versions 22. 7R2. 4 and 22. 7R1. 3, respectively. It allows a remote attacker with administrative privileges to execute arbitrary code on the affected system without user interaction. The vulnerability arises from improper control over code generation (CWE-94), enabling malicious input to be executed. Exploitation requires authentication with high privileges but can lead to full compromise of confidentiality, integrity, and availability. No known exploits are currently reported in the wild. The CVSS score is 9.
AI Analysis
Technical Summary
CVE-2024-10644 is a severe vulnerability classified under CWE-94, which involves improper control of code generation, commonly known as code injection. This flaw affects Ivanti Connect Secure versions prior to 22.7R2.4 and Ivanti Policy Secure versions prior to 22.7R1.3. The vulnerability allows a remote attacker who has authenticated with administrative privileges to inject and execute arbitrary code on the underlying system. The root cause is insufficient validation or sanitization of input that is used in code generation or execution contexts within the affected Ivanti products. Because the attacker must already have admin-level access, the vulnerability is primarily a post-authentication risk, but the impact is critical as it enables complete system compromise, including data theft, system manipulation, and denial of service. The CVSS v3.1 base score of 9.1 reflects the network attack vector, low attack complexity, required high privileges, no user interaction, and a scope change indicating that the vulnerability affects components beyond the initially vulnerable code. Although no public exploits have been reported yet, the critical nature of the vulnerability and the widespread use of Ivanti Connect Secure in enterprise VPN and remote access solutions make it a significant threat. The vulnerability was published on February 11, 2025, and organizations are urged to upgrade to the fixed versions or apply available mitigations promptly.
Potential Impact
The impact of CVE-2024-10644 is substantial for organizations globally that rely on Ivanti Connect Secure or Ivanti Policy Secure for remote access and VPN services. Successful exploitation allows attackers with administrative credentials to execute arbitrary code remotely, potentially leading to full system compromise. This can result in unauthorized access to sensitive data, disruption of remote access services, lateral movement within networks, and deployment of further malware or ransomware. Given the critical role of these products in securing remote connectivity, exploitation could severely impact business continuity, data confidentiality, and integrity. The vulnerability's requirement for admin privileges means that initial compromise or insider threats could be escalated to full control. Organizations in sectors such as finance, healthcare, government, and critical infrastructure, which often use Ivanti products for secure remote access, face heightened risk. The absence of known exploits in the wild currently provides a window for proactive defense, but the high CVSS score indicates that once exploited, the damage potential is severe.
Mitigation Recommendations
To mitigate CVE-2024-10644, organizations should immediately upgrade Ivanti Connect Secure to version 22.7R2.4 or later and Ivanti Policy Secure to version 22.7R1.3 or later once patches are available. Until patches are applied, restrict administrative access to the affected systems using network segmentation, VPN access controls, and multi-factor authentication to reduce the risk of credential compromise. Conduct thorough audits of admin accounts and monitor for unusual administrative activity. Employ strict input validation and code execution policies where possible, and consider deploying application-layer firewalls or intrusion detection systems tuned to detect anomalous behavior related to code injection attempts. Additionally, implement robust logging and alerting to detect potential exploitation attempts early. Regularly review and update incident response plans to address potential exploitation scenarios. Organizations should also educate administrators about the risks of privilege misuse and enforce the principle of least privilege to limit the number of users with admin rights.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, Japan, Netherlands, South Korea, India
CVE-2024-10644: CWE-94 Improper Control of Generation of Code ('Code Injection') in Ivanti Connect Secure
Description
CVE-2024-10644 is a critical code injection vulnerability in Ivanti Connect Secure and Ivanti Policy Secure products prior to versions 22. 7R2. 4 and 22. 7R1. 3, respectively. It allows a remote attacker with administrative privileges to execute arbitrary code on the affected system without user interaction. The vulnerability arises from improper control over code generation (CWE-94), enabling malicious input to be executed. Exploitation requires authentication with high privileges but can lead to full compromise of confidentiality, integrity, and availability. No known exploits are currently reported in the wild. The CVSS score is 9.
AI-Powered Analysis
Technical Analysis
CVE-2024-10644 is a severe vulnerability classified under CWE-94, which involves improper control of code generation, commonly known as code injection. This flaw affects Ivanti Connect Secure versions prior to 22.7R2.4 and Ivanti Policy Secure versions prior to 22.7R1.3. The vulnerability allows a remote attacker who has authenticated with administrative privileges to inject and execute arbitrary code on the underlying system. The root cause is insufficient validation or sanitization of input that is used in code generation or execution contexts within the affected Ivanti products. Because the attacker must already have admin-level access, the vulnerability is primarily a post-authentication risk, but the impact is critical as it enables complete system compromise, including data theft, system manipulation, and denial of service. The CVSS v3.1 base score of 9.1 reflects the network attack vector, low attack complexity, required high privileges, no user interaction, and a scope change indicating that the vulnerability affects components beyond the initially vulnerable code. Although no public exploits have been reported yet, the critical nature of the vulnerability and the widespread use of Ivanti Connect Secure in enterprise VPN and remote access solutions make it a significant threat. The vulnerability was published on February 11, 2025, and organizations are urged to upgrade to the fixed versions or apply available mitigations promptly.
Potential Impact
The impact of CVE-2024-10644 is substantial for organizations globally that rely on Ivanti Connect Secure or Ivanti Policy Secure for remote access and VPN services. Successful exploitation allows attackers with administrative credentials to execute arbitrary code remotely, potentially leading to full system compromise. This can result in unauthorized access to sensitive data, disruption of remote access services, lateral movement within networks, and deployment of further malware or ransomware. Given the critical role of these products in securing remote connectivity, exploitation could severely impact business continuity, data confidentiality, and integrity. The vulnerability's requirement for admin privileges means that initial compromise or insider threats could be escalated to full control. Organizations in sectors such as finance, healthcare, government, and critical infrastructure, which often use Ivanti products for secure remote access, face heightened risk. The absence of known exploits in the wild currently provides a window for proactive defense, but the high CVSS score indicates that once exploited, the damage potential is severe.
Mitigation Recommendations
To mitigate CVE-2024-10644, organizations should immediately upgrade Ivanti Connect Secure to version 22.7R2.4 or later and Ivanti Policy Secure to version 22.7R1.3 or later once patches are available. Until patches are applied, restrict administrative access to the affected systems using network segmentation, VPN access controls, and multi-factor authentication to reduce the risk of credential compromise. Conduct thorough audits of admin accounts and monitor for unusual administrative activity. Employ strict input validation and code execution policies where possible, and consider deploying application-layer firewalls or intrusion detection systems tuned to detect anomalous behavior related to code injection attempts. Additionally, implement robust logging and alerting to detect potential exploitation attempts early. Regularly review and update incident response plans to address potential exploitation scenarios. Organizations should also educate administrators about the risks of privilege misuse and enforce the principle of least privilege to limit the number of users with admin rights.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- ivanti
- Date Reserved
- 2024-10-31T19:32:56.456Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a0a43885912abc71d61ad8
Added to database: 2/26/2026, 7:51:20 PM
Last enriched: 2/26/2026, 9:46:54 PM
Last updated: 2/26/2026, 10:50:42 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-42056: n/a
MediumCVE-2024-3331: Vulnerability in Spotfire Spotfire Enterprise Runtime for R - Server Edition
MediumCVE-2024-32902: Denial of service in Google Android
HighCVE-2024-27218: Information disclosure in Google Android
MediumCVE-2026-3264: Execution After Redirect in go2ismail Free-CRM
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.