{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-22023","assignerOrgId":"36234546-b8fa-4601-9d6f-f4e334aa8ea1","state":"PUBLISHED","assignerShortName":"hackerone","dateReserved":"2024-01-04T01:04:06.574Z","datePublished":"2024-04-04T19:45:10.162Z","dateUpdated":"2024-10-03T21:38:58.416Z"},"containers":{"cna":{"descriptions":[{"lang":"en","value":"An XML entity expansion or XEE vulnerability in SAML component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure allows an unauthenticated attacker to send specially crafted XML requests in-order-to temporarily cause resource exhaustion thereby resulting in a limited-time DoS. "}],"affected":[{"defaultStatus":"unaffected","vendor":"Ivanti","product":"Connect Secure","versions":[{"version":"22.1R6.2","status":"affected","lessThan":"22.1R6.2","versionType":"semver"},{"version":"22.2R4.2","status":"affected","lessThan":"22.2R4.2","versionType":"semver"},{"version":"22.3R1.2","status":"affected","lessThan":"22.3R1.2","versionType":"semver"},{"version":"22.4R1.2","status":"affected","lessThan":"22.4R1.2","versionType":"semver"},{"version":"22.4R2.4","status":"affected","lessThan":"22.4R2.4","versionType":"semver"},{"version":"22.5R1.3","status":"affected","lessThan":"22.5R1.3","versionType":"semver"},{"version":"22.5R2.4","status":"affected","lessThan":"22.5R2.4","versionType":"semver"},{"version":"22.6R2.3","status":"affected","lessThan":"22.6R2.3","versionType":"semver"},{"version":"9.1R14.6","status":"affected","lessThan":"9.1R14.6","versionType":"semver"},{"version":"9.1R15.4","status":"affected","lessThan":"9.1R15.4","versionType":"semver"},{"version":"9.1R16.4","status":"affected","lessThan":"9.1R16.4","versionType":"semver"},{"version":"9.1R17.4","status":"affected","lessThan":"9.1R17.4","versionType":"semver"},{"version":"9.1R18.5","status":"affected","lessThan":"9.1R18.5","versionType":"semver"}]},{"defaultStatus":"unaffected","vendor":"Ivanti","product":"Policy Secure","versions":[{"version":"22.4R1.2","status":"affected","lessThan":"22.4R1.2","versionType":"semver"},{"version":"22.5R1.3","status":"affected","lessThan":"22.5R1.3","versionType":"semver"},{"version":"22.6R1.2","status":"affected","lessThan":"22.6R1.2","versionType":"semver"},{"version":"9.1R16.4","status":"affected","lessThan":"9.1R16.4","versionType":"semver"},{"version":"9.1R17.4","status":"affected","lessThan":"9.1R17.4","versionType":"semver"},{"version":"9.1R18.5","status":"affected","lessThan":"9.1R18.5","versionType":"semver"}]}],"references":[{"url":"https://forums.ivanti.com/s/article/New-CVE-2024-21894-Heap-Overflow-CVE-2024-22052-Null-Pointer-Dereference-CVE-2024-22053-Heap-Overflow-and-CVE-2024-22023-XML-entity-expansion-or-XXE-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US"}],"metrics":[{"cvssV3_0":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","baseScore":5.3,"baseSeverity":"MEDIUM"}}],"providerMetadata":{"orgId":"36234546-b8fa-4601-9d6f-f4e334aa8ea1","shortName":"hackerone","dateUpdated":"2024-04-04T19:45:10.162Z"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-703","lang":"en","description":"CWE-703 Improper Check or Handling of Exceptional Conditions"}]}],"affected":[{"vendor":"ivanti","product":"connect_secure","cpes":["cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"version":"9.1R18.5","status":"affected"},{"version":"22.6R2.3","status":"affected"},{"version":"9.1R17.4","status":"affected"},{"version":"22.2R3","status":"affected"},{"version":"22.5R2.4","status":"affected"},{"version":"9.1R14.6","status":"affected"},{"version":"9.1R15.4","status":"affected"},{"version":"22.2R4.2","status":"affected"},{"version":"22.4R1.2","status":"affected"},{"version":"22.6R1.2","status":"affected"},{"version":"22.1R6.2","status":"affected"},{"version":"22.3R1.2","status":"affected"},{"version":"22.4R2.4","status":"affected"},{"version":"22.5R1.3","status":"affected"}]},{"vendor":"ivanti","product":"policy_secure","cpes":["cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"version":"22.4R1.2","status":"affected"},{"version":"22.5R1.3","status":"affected"},{"version":"22.6R1.2","status":"affected"},{"version":"9.1R16.4","status":"affected"},{"version":"9.1R17.4","status":"affected"},{"version":"9.1R18.5","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-04-05T13:19:01.057408Z","id":"CVE-2024-22023","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-03T21:38:58.416Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T22:35:34.713Z"},"title":"CVE Program Container","references":[{"url":"https://forums.ivanti.com/s/article/New-CVE-2024-21894-Heap-Overflow-CVE-2024-22052-Null-Pointer-Dereference-CVE-2024-22053-Heap-Overflow-and-CVE-2024-22023-XML-entity-expansion-or-XXE-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US","tags":["x_transferred"]}]}]}}