### [CVE-2024-38655](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38655) ![](https://img.shields.io/static/v1?label=Product&message=Connect%20Secure&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Policy%20Secure&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=22.7R1.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=22.7R2.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=9.1R18.9%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue) ### Description Argument injection in Ivanti Connect Secure before version 22.7R2.1 and 9.1R18.9 and Ivanti Policy Secure before version 22.7R1.1 and 9.1R18.9 allows a remote authenticated attacker with admin privileges to achieve remote code execution. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cve-scores