www.tenable.com
Open in
urlscan Pro
104.16.49.5
Public Scan
URL:
https://www.tenable.com/plugins/nessus/208266
Submission: On December 20 via api from IN — Scanned from IL
Submission: On December 20 via api from IN — Scanned from IL
Form analysis
0 forms found in the DOMText Content
* * Plugins * Settings LINKS Tenable Cloud Tenable Community & Support Tenable University Severity VPRCVSS v2CVSS v3CVSS v4 Theme LightDarkAuto Help * * Plugins OverviewPlugins PipelineNewestUpdatedSearchNessus FamiliesWAS FamiliesNNM FamiliesLCE FamiliesTenable OT Security FamiliesAbout Plugin FamiliesRelease Notes * Audits OverviewNewestUpdatedSearch Audit FilesSearch ItemsReferencesAuthoritiesDocumentationDownload All Audit Files * Indicators OverviewSearchIndicators of AttackIndicators of Exposure * CVEs OverviewNewestUpdatedSearch * Attack Path Techniques OverviewSearch * Links Tenable CloudTenable Community & SupportTenable University * Settings Severity VPRCVSS v2CVSS v3CVSS v4 Theme LightDarkAuto DETECTIONS * Plugins OverviewPlugins PipelineRelease NotesNewestUpdatedSearchNessus FamiliesWAS FamiliesNNM FamiliesLCE FamiliesTenable OT Security FamiliesAbout Plugin Families * Audits OverviewNewestUpdatedSearch Audit FilesSearch ItemsReferencesAuthoritiesDocumentationDownload All Audit Files * Indicators OverviewSearchIndicators of AttackIndicators of Exposure ANALYTICS * CVEs OverviewNewestUpdatedSearch * Attack Path Techniques OverviewSearch 1. Plugins 2. Nessus 3. 208266 1. Nessus IVANTI ENDPOINT MANAGER CLOUD SERVICES APPLIANCE < 5.0.2 MULTIPLE VULNERABILITIES HIGH NESSUS PLUGIN ID 208266 Language: English 日本語简体中文繁體中文English * Information * Dependencies * Dependents * Changelog SYNOPSIS The instance of Ivanti Endpoint Manager Cloud Services Appliance running on the remote host is affected by multiple vulnerabilities. DESCRIPTION The version of Ivanti Endpoint Manager Cloud Services Appliance running on the remote host is prior to 5.0.2. It is, therefore, affected by multiple vulnerabilities: - An OS command injection vulnerability in the admin web console of Ivanti CSA before version 5.0.2 allows a remote authenticated attacker with admin privileges to obtain remote code execution. (CVE-2024-9380) - Path traversal in Ivanti CSA before version 5.0.2 allows a remote authenticated attacker with admin privileges to bypass restrictions. (CVE-2024-9381) - SQL injection in the admin web console of Ivanti CSA before version 5.0.2 allows a remote authenticated attacker with admin privileges to run arbitrary SQL statements. (CVE-2024-9379) Note that Nessus has not tested for these issues but has instead relied only on the service's self-reported version number. SOLUTION Update to Ivanti Endpoint Manager Cloud Services Appliance 5.0.2 or later SEE ALSO http://www.nessus.org/u?ed15bc0b PLUGIN DETAILS Severity: High ID: 208266 File Name: ivanti_endpoint_manager_5_0_2.nasl Version: 1.7 Type: remote Agent: windows Family: Windows Published: 10/8/2024 Updated: 12/13/2024 Supported Sensors: Nessus RISK INFORMATION VPR Risk Factor: High Score: 7.4 CVSS V2 Risk Factor: High Base Score: 8.3 Temporal Score: 6.9 Vector: CVSS2#AV:N/AC:L/Au:M/C:C/I:C/A:C CVSS Score Source: CVE-2024-9381 CVSS V3 Risk Factor: High Base Score: 7.2 Temporal Score: 6.7 Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C VULNERABILITY INFORMATION CPE: cpe:/a:ivanti:endpoint_manager_cloud_services_appliance Required KB Items: installed_sw/Ivanti Endpoint Manager Cloud Services Appliance Exploit Available: true Exploit Ease: Exploits are available Patch Publication Date: 10/8/2024 Vulnerability Publication Date: 10/8/2024 CISA Known Exploited Vulnerability Due Dates: 10/30/2024 REFERENCE INFORMATION CVE: CVE-2024-9379, CVE-2024-9380, CVE-2024-9381 CWE: 22, 77, 89 IAVA: 2024-A-0636-S * Tenable.com * Community & Support * Documentation * Education * © 2024 Tenable®, Inc. All Rights Reserved * Privacy Policy * Legal * 508 Compliance