Ivanti has rolled out security updates for a critical flaw in Virtual Traffic Manager (vTM) that could be exploited to achieve an authentication bypass and create rogue administrative users.
The vulnerability, tracked as CVE-2024-7593, has a CVSS score of 9.8 out of a maximum of 10.0.
It impacts the following versions of vTM - 22.2 (fixed in version 22.2R1), 22.3 (fixed in version 22.3R3, available week of August 19, 2024), 22.3R2 (fixed in version 22.3R3, available week of August 19, 2024), 22.5R1 (fixed in version 22.5R2, available week of August 19, 2024), 22.6R1 (fixed in version 22.6R2, available week of August 19, 2024), 22.7R1 (fixed in version 22.7R2), “Incorrect implementation of an authentication algorithm in Ivanti vTM other than versions 22.2R1 or 22.7R2 allows a remote unauthenticated attacker to bypass authentication of the admin panel. CVE-2024-7569 (CVSS score: 9.6) - An information disclosure vulnerability in Ivanti ITSM on-prem and Neurons for ITSM versions 2023.4 and earlier allows an unauthenticated attacker to obtain the OIDC client secret via debug information.