Total vulnerabilities in the database
A vulnerability exists on all versions of Ivanti Connect Secure below 22.6R2 where an attacker with a foothold on an Ivanti Connect Secure (ICS) appliance can escalate their privileges by exploiting a vulnerable installed application. This vulnerability allows the attacker to gain elevated execution privileges on the affected system.
Software | From | Fixed in |
---|---|---|
ivanti / connect_secure | 22.1-r1 | 22.1-r1.x |
ivanti / connect_secure | 22.2-r1 | 22.2-r1.x |
ivanti / connect_secure | 22.5-r2.1 | 22.5-r2.1.x |
ivanti / connect_secure | 22.4-r2.1 | 22.4-r2.1.x |
ivanti / connect_secure | 22.3-r1 | 22.3-r1.x |
ivanti / connect_secure | 22.4-r1 | 22.4-r1.x |
ivanti / connect_secure | 22.1-r6 | 22.1-r6.x |
ivanti / connect_secure | 22.2 | 22.2.x |
ivanti / connect_secure | 22.4-r2.2 | 22.4-r2.2.x |
ivanti / connect_secure | 22.5-r1.1 | 22.5-r1.1.x |
ivanti / connect_secure | 22.6 | 22.6.x |
ivanti / connect_secure | 22.6-r1 | 22.6-r1.x |