VYPR
Critical severity9.8CISA KEVNVD Advisory· Published Aug 13, 2024· Updated May 14, 2026

CVE-2024-7593

CVE-2024-7593

Description

Incorrect implementation of an authentication algorithm in Ivanti vTM other than versions 22.2R1 or 22.7R2 allows a remote unauthenticated attacker to bypass authentication of the admin panel.

Affected products

7
  • cpe:2.3:a:ivanti:virtual_traffic_manager:22.2:*:*:*:*:*:*:*+ 5 more
    • cpe:2.3:a:ivanti:virtual_traffic_manager:22.2:*:*:*:*:*:*:*
    • cpe:2.3:a:ivanti:virtual_traffic_manager:22.3:-:*:*:*:*:*:*
    • cpe:2.3:a:ivanti:virtual_traffic_manager:22.3:r2:*:*:*:*:*:*
    • cpe:2.3:a:ivanti:virtual_traffic_manager:22.5:r1:*:*:*:*:*:*
    • cpe:2.3:a:ivanti:virtual_traffic_manager:22.6:r1:*:*:*:*:*:*
    • cpe:2.3:a:ivanti:virtual_traffic_manager:22.7:r1:*:*:*:*:*:*
  • Ivanti/vTMv5
    Range: 22.7R2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.