Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-9379: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Ivanti CSA (Cloud Services Appliance)

0
Medium
VulnerabilityCVE-2024-9379cvecve-2024-9379cwe-89
Published: Tue Oct 08 2024 (10/08/2024, 16:23:13 UTC)
Source: CVE Database V5
Vendor/Project: Ivanti
Product: CSA (Cloud Services Appliance)

Description

SQL injection in the admin web console of Ivanti CSA before version 5.0.2 allows a remote authenticated attacker with admin privileges to run arbitrary SQL statements.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 16:59:55 UTC

Technical Analysis

CVE-2024-9379 identifies an SQL injection vulnerability classified under CWE-89 in Ivanti's Cloud Services Appliance (CSA) admin web console versions before 5.0.2. This vulnerability arises from improper neutralization of special elements in SQL commands, allowing an authenticated attacker with administrative privileges to inject and execute arbitrary SQL statements against the backend database. The flaw exists in the web interface that manages the appliance, enabling manipulation of SQL queries without proper sanitization or parameterization. Exploiting this vulnerability can lead to unauthorized modification or deletion of data, disruption of service, or corruption of the appliance’s database. The attack vector is remote network access to the admin console, requiring high privilege authentication but no additional user interaction. The CVSS v3.1 score is 6.5 (medium), reflecting the ease of exploitation given admin access and the significant impact on integrity and availability, but no direct confidentiality impact. No public exploits or widespread attacks have been reported yet, but the vulnerability poses a serious risk to organizations relying on Ivanti CSA for cloud service management. The vendor has released version 5.0.2 to address this issue, though no direct patch links are provided in the data.

Potential Impact

The primary impact of CVE-2024-9379 is on the integrity and availability of the Ivanti CSA appliance’s data and services. An attacker with admin credentials can execute arbitrary SQL commands, potentially altering or deleting critical configuration data, disrupting cloud service management operations, or corrupting the appliance database. This can lead to service outages, loss of operational control, and increased recovery costs. Although confidentiality is not directly compromised, the integrity and availability impacts can indirectly affect organizational security posture and operational continuity. Organizations relying on Ivanti CSA for cloud service orchestration or security management may face significant operational risks if this vulnerability is exploited. The requirement for admin privileges limits the attack scope to insiders or attackers who have already compromised admin credentials, but the ease of exploitation once authenticated makes it a critical issue to address promptly.

Mitigation Recommendations

Organizations should immediately upgrade Ivanti CSA to version 5.0.2 or later, where this SQL injection vulnerability is patched. Until the update is applied, restrict access to the admin web console to trusted networks and users only, employing network segmentation and strong access controls. Implement multi-factor authentication (MFA) for all admin accounts to reduce the risk of credential compromise. Regularly audit admin account usage and monitor logs for suspicious SQL query patterns or unusual admin activities. Employ web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the admin console. Additionally, conduct periodic security assessments and penetration tests focusing on the Ivanti CSA environment to identify any residual or related vulnerabilities. Maintain a strict patch management process to ensure timely application of security updates from Ivanti.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
ivanti
Date Reserved
2024-09-30T21:10:35.318Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9b8247d717aace26cb6

Added to database: 10/21/2025, 7:06:32 PM

Last enriched: 2/27/2026, 4:59:55 PM

Last updated: 3/25/2026, 3:52:10 PM

Views: 141

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses