Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-21893: Vulnerability in Ivanti ICS

0
High
VulnerabilityCVE-2024-21893cvecve-2024-21893
Published: Wed Jan 31 2024 (01/31/2024, 17:51:35 UTC)
Source: CVE Database V5
Vendor/Project: Ivanti
Product: ICS

Description

A server-side request forgery vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) and Ivanti Neurons for ZTA allows an attacker to access certain restricted resources without authentication.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 09:08:06 UTC

Technical Analysis

CVE-2024-21893 is a server-side request forgery (SSRF) vulnerability identified in the SAML authentication component of Ivanti Connect Secure (ICS) versions 9.x and 22.x, Ivanti Policy Secure, and Ivanti Neurons for Zero Trust Access (ZTA). SSRF vulnerabilities occur when an attacker can manipulate a server to make unauthorized requests to internal or external resources, bypassing normal access controls. In this case, the flaw allows unauthenticated attackers to craft requests that the vulnerable Ivanti products will execute, enabling access to restricted internal resources that should otherwise require authentication. The vulnerability is classified under CWE-918 (Server-Side Request Forgery). The CVSS v3.0 score of 8.2 reflects a high severity, with an attack vector of network (remote), low attack complexity, no privileges required, and no user interaction needed. The impact primarily affects confidentiality, as attackers can retrieve sensitive data from internal systems, while integrity is only slightly impacted and availability is unaffected. Ivanti ICS and related products are widely deployed in enterprise environments for secure remote access and policy enforcement, making this vulnerability particularly concerning. No patches or exploit code are currently publicly available, but the vulnerability's nature suggests it could be exploited to pivot into internal networks or access sensitive information. Organizations should monitor for suspicious internal requests and prepare to apply vendor patches promptly once released.

Potential Impact

The potential impact of CVE-2024-21893 is significant for organizations relying on Ivanti Connect Secure and related products for secure remote access and identity management. Successful exploitation allows attackers to bypass authentication controls and access restricted internal resources, potentially exposing sensitive data such as internal configuration, user credentials, or proprietary information. This can lead to further lateral movement within the network, increasing the risk of data breaches or espionage. The vulnerability's ease of exploitation—requiring no authentication or user interaction—heightens the threat level. Enterprises in sectors such as finance, healthcare, government, and critical infrastructure that use Ivanti ICS for secure access are particularly vulnerable. The lack of known public exploits currently limits immediate widespread attacks, but the vulnerability's disclosure may prompt threat actors to develop exploits rapidly. Failure to mitigate this vulnerability could result in significant confidentiality breaches and undermine trust in secure access solutions.

Mitigation Recommendations

To mitigate CVE-2024-21893, organizations should: 1) Monitor Ivanti's official channels closely for patches and apply them immediately upon release to remediate the vulnerability. 2) Implement network segmentation and firewall rules to restrict outbound requests from Ivanti ICS servers, limiting their ability to reach unauthorized internal resources. 3) Use web application firewalls (WAFs) or intrusion detection/prevention systems (IDS/IPS) to detect and block suspicious SSRF attack patterns targeting the SAML component. 4) Review and harden SAML configurations to ensure minimal exposure and validate all incoming requests rigorously. 5) Conduct internal audits and penetration testing focused on SSRF vectors to identify and remediate similar weaknesses. 6) Employ strict egress filtering on servers hosting Ivanti products to prevent unauthorized server-side requests. 7) Educate security teams about SSRF risks and monitoring techniques specific to Ivanti ICS environments. These targeted actions go beyond generic advice by focusing on network-level controls and configuration hardening specific to the affected products and vulnerability type.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
hackerone
Date Reserved
2024-01-03T01:04:06.539Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68f7d9b1247d717aace2692e

Added to database: 10/21/2025, 7:06:25 PM

Last enriched: 2/28/2026, 9:08:06 AM

Last updated: 3/25/2026, 10:14:03 PM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses