Skip to content

Incorrect implementation of an authentication algorithm in Ivanti vTM other than versions 22.2R1 or 22.7R2 allows a remote unauthenticated attacker to bypass authentication of the admin panel.

Notifications You must be signed in to change notification settings

rxerium/CVE-2024-7593

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 

Repository files navigation

CVE-2024-7593 Detection

How does this detection method work?

This template matches on the following versions, if there is a match then the host is considered vulnerable:

- "22.2"
- "22.3"
- "22.3R2"
- "22.5R1"
- "22.6R1"
- "22.7R1"

To prevent producing any FPs it also matches on the below:

- type: word
part: body
words:
    - "Login (Virtual Traffic Manager"

How do I run this script?

  1. Download Nuclei from here
  2. Copy the template to your local system
  3. Run the following command: nuclei -u https://yourHost.com -t template.yaml

References

Disclaimer

Use at your own risk, I will not be responsible for illegal activities you conduct on infrastructure you do not own or have permission to scan.

Contact

If you have any questions feel free to reach out to me on Signal or via email: rishi@rxerium.com.

About

Incorrect implementation of an authentication algorithm in Ivanti vTM other than versions 22.2R1 or 22.7R2 allows a remote unauthenticated attacker to bypass authentication of the admin panel.

Topics

Resources

Stars

Watchers

Forks