mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
171 lines
8.2 KiB
JSON
171 lines
8.2 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2024-22052",
|
|
"ASSIGNER": "support@hackerone.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "A null pointer dereference vulnerability in IPSec component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure allows an unauthenticated malicious user to send specially crafted requests in-order-to crash the service thereby causing a DoS attack "
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Ivanti",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Connect Secure",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "22.1R6.2",
|
|
"version_value": "22.1R6.2"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "22.2R4.2",
|
|
"version_value": "22.2R4.2"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "22.3R1.2",
|
|
"version_value": "22.3R1.2"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "22.4R1.2",
|
|
"version_value": "22.4R1.2"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "22.4R2.4",
|
|
"version_value": "22.4R2.4"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "22.5R1.3",
|
|
"version_value": "22.5R1.3"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "22.5R2.4",
|
|
"version_value": "22.5R2.4"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "22.6R2.3",
|
|
"version_value": "22.6R2.3"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "9.1R14.6",
|
|
"version_value": "9.1R14.6"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "9.1R15.4",
|
|
"version_value": "9.1R15.4"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "9.1R16.4",
|
|
"version_value": "9.1R16.4"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "9.1R17.4",
|
|
"version_value": "9.1R17.4"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "9.1R18.5",
|
|
"version_value": "9.1R18.5"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Policy Secure",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "22.4R1.2",
|
|
"version_value": "22.4R1.2"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "22.5R1.3",
|
|
"version_value": "22.5R1.3"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "22.6R1.2",
|
|
"version_value": "22.6R1.2"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "9.1R16.4",
|
|
"version_value": "9.1R16.4"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "9.1R17.4",
|
|
"version_value": "9.1R17.4"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "9.1R18.5",
|
|
"version_value": "9.1R18.5"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://forums.ivanti.com/s/article/New-CVE-2024-21894-Heap-Overflow-CVE-2024-22052-Null-Pointer-Dereference-CVE-2024-22053-Heap-Overflow-and-CVE-2024-22023-XML-entity-expansion-or-XXE-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US",
|
|
"refsource": "MISC",
|
|
"name": "https://forums.ivanti.com/s/article/New-CVE-2024-21894-Heap-Overflow-CVE-2024-22052-Null-Pointer-Dereference-CVE-2024-22053-Heap-Overflow-and-CVE-2024-22023-XML-entity-expansion-or-XXE-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US"
|
|
}
|
|
]
|
|
},
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"baseScore": 7.5,
|
|
"baseSeverity": "HIGH"
|
|
}
|
|
]
|
|
}
|
|
} |