Critical severity9.8CISA KEVNVD Advisory· Published Aug 13, 2024· Updated May 14, 2026
CVE-2024-7593
CVE-2024-7593
Description
Incorrect implementation of an authentication algorithm in Ivanti vTM other than versions 22.2R1 or 22.7R2 allows a remote unauthenticated attacker to bypass authentication of the admin panel.
Affected products
7cpe:2.3:a:ivanti:virtual_traffic_manager:22.2:*:*:*:*:*:*:*+ 5 more
- cpe:2.3:a:ivanti:virtual_traffic_manager:22.2:*:*:*:*:*:*:*
- cpe:2.3:a:ivanti:virtual_traffic_manager:22.3:-:*:*:*:*:*:*
- cpe:2.3:a:ivanti:virtual_traffic_manager:22.3:r2:*:*:*:*:*:*
- cpe:2.3:a:ivanti:virtual_traffic_manager:22.5:r1:*:*:*:*:*:*
- cpe:2.3:a:ivanti:virtual_traffic_manager:22.6:r1:*:*:*:*:*:*
- cpe:2.3:a:ivanti:virtual_traffic_manager:22.7:r1:*:*:*:*:*:*
- Ivanti/vTMv5Range: 22.7R2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- forums.ivanti.com/s/article/Security-Advisory-Ivanti-Virtual-Traffic-Manager-vTM-CVE-2024-7593nvdMitigationPatchVendor Advisory
- www.cisa.gov/known-exploited-vulnerabilities-catalognvdUS Government Resource
News mentions
0No linked articles in our index yet.