Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-10644: CWE-94 Improper Control of Generation of Code ('Code Injection') in Ivanti Connect Secure

0
Critical
VulnerabilityCVE-2024-10644cvecve-2024-10644cwe-94
Published: Tue Feb 11 2025 (02/11/2025, 15:20:46 UTC)
Source: CVE Database V5
Vendor/Project: Ivanti
Product: Connect Secure

Description

CVE-2024-10644 is a critical code injection vulnerability in Ivanti Connect Secure and Ivanti Policy Secure products prior to versions 22. 7R2. 4 and 22. 7R1. 3, respectively. It allows a remote attacker with administrative privileges to execute arbitrary code on the affected system without user interaction. The vulnerability arises from improper control over code generation (CWE-94), enabling malicious input to be executed. Exploitation requires authentication with high privileges but can lead to full compromise of confidentiality, integrity, and availability. No known exploits are currently reported in the wild. The CVSS score is 9.

AI-Powered Analysis

AILast updated: 02/26/2026, 21:46:54 UTC

Technical Analysis

CVE-2024-10644 is a severe vulnerability classified under CWE-94, which involves improper control of code generation, commonly known as code injection. This flaw affects Ivanti Connect Secure versions prior to 22.7R2.4 and Ivanti Policy Secure versions prior to 22.7R1.3. The vulnerability allows a remote attacker who has authenticated with administrative privileges to inject and execute arbitrary code on the underlying system. The root cause is insufficient validation or sanitization of input that is used in code generation or execution contexts within the affected Ivanti products. Because the attacker must already have admin-level access, the vulnerability is primarily a post-authentication risk, but the impact is critical as it enables complete system compromise, including data theft, system manipulation, and denial of service. The CVSS v3.1 base score of 9.1 reflects the network attack vector, low attack complexity, required high privileges, no user interaction, and a scope change indicating that the vulnerability affects components beyond the initially vulnerable code. Although no public exploits have been reported yet, the critical nature of the vulnerability and the widespread use of Ivanti Connect Secure in enterprise VPN and remote access solutions make it a significant threat. The vulnerability was published on February 11, 2025, and organizations are urged to upgrade to the fixed versions or apply available mitigations promptly.

Potential Impact

The impact of CVE-2024-10644 is substantial for organizations globally that rely on Ivanti Connect Secure or Ivanti Policy Secure for remote access and VPN services. Successful exploitation allows attackers with administrative credentials to execute arbitrary code remotely, potentially leading to full system compromise. This can result in unauthorized access to sensitive data, disruption of remote access services, lateral movement within networks, and deployment of further malware or ransomware. Given the critical role of these products in securing remote connectivity, exploitation could severely impact business continuity, data confidentiality, and integrity. The vulnerability's requirement for admin privileges means that initial compromise or insider threats could be escalated to full control. Organizations in sectors such as finance, healthcare, government, and critical infrastructure, which often use Ivanti products for secure remote access, face heightened risk. The absence of known exploits in the wild currently provides a window for proactive defense, but the high CVSS score indicates that once exploited, the damage potential is severe.

Mitigation Recommendations

To mitigate CVE-2024-10644, organizations should immediately upgrade Ivanti Connect Secure to version 22.7R2.4 or later and Ivanti Policy Secure to version 22.7R1.3 or later once patches are available. Until patches are applied, restrict administrative access to the affected systems using network segmentation, VPN access controls, and multi-factor authentication to reduce the risk of credential compromise. Conduct thorough audits of admin accounts and monitor for unusual administrative activity. Employ strict input validation and code execution policies where possible, and consider deploying application-layer firewalls or intrusion detection systems tuned to detect anomalous behavior related to code injection attempts. Additionally, implement robust logging and alerting to detect potential exploitation attempts early. Regularly review and update incident response plans to address potential exploitation scenarios. Organizations should also educate administrators about the risks of privilege misuse and enforce the principle of least privilege to limit the number of users with admin rights.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ivanti
Date Reserved
2024-10-31T19:32:56.456Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0a43885912abc71d61ad8

Added to database: 2/26/2026, 7:51:20 PM

Last enriched: 2/26/2026, 9:46:54 PM

Last updated: 2/26/2026, 10:50:42 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses