### [CVE-2024-9420](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9420) ![](https://img.shields.io/static/v1?label=Product&message=Connect%20Secure&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Policy%20Secure&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=22.7R1.2%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=22.7R2.3%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-416%20Use%20After%20Free&color=brightgreen) ### Description A use-after-free in Ivanti Connect Secure before version 22.7R2.3 and 9.1R18.9 and Ivanti Policy Secure before version 22.7R1.2 allows a remote authenticated attacker to achieve remote code execution ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cve-scores