CVE-2023-46805

An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access...

Basic Information

CVE State
PUBLISHED
Reserved Date
October 27, 2023
Published Date
January 12, 2024
Last Updated
February 13, 2025
Vendor
Ivanti
Product
ICS, IPS
Description
An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks.
Tags
cisa nuclei_scanner edge metasploit_scanner nessus_scanner

CVSS Scores

CVSS v3.0

8.2 - HIGH

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

SSVC Information

Exploitation
active
Automatable
Yes
Technical Impact
partial

Exploit Status

Exploited in the Wild
Yes (2025-05-07 00:00:00 UTC) Source
Proof of Concept Available
Yes (added 2024-01-25 14:53:16 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
CISA 2024-01-10 00:00:00 UTC

Recent Mentions

Written by: Casey Charrier, James Sadowski, Clement Lecigne, Vlad Stolyarov Executive Summary Google Threat Intelligence Group (GTIG) tracked 75 zero-day vulnerabilities exploited in the wild in 2024, a decrease from the number we identified in 2023 (98 vulnerabilities), but still an increase from 2022 (63 vulnerabilities). We divided the reviewed vulnerabilities into two main categories: end-user platforms and products (e.g., mobile devices, operating systems, and browsers) and enterprise-focused technologies, such as security software and appliances.  Vendors continue to drive improvements that make some zero-day exploitation harder, demonstrated by both dwindling numbers across multiple categories and reduced observed attacks against previously popular targets. At the same time, commercial surveillance vendors (CSVs) appear to be increasing their operational security practices, potentially leading to decreased attribution and detection. We see zero-day exploitation targeting a greater number and wider variety of enterprise-specific technologies, although these technologies still remain a smaller proportion of overall exploitation when compared to end-user technologies. While the historic focus on the exploitation of popular end-user technologies and their users continues, the shift toward increased targeting of enterprise-focused products will require a wider and more diverse set of vendors to increase proactive security measures in order to reduce future zero-day exploitation attempts. For a deeper look at the trends discussed in this report, along with recommendations for defenders, register for our upcoming zero-day webinar. Scope  This report describes what Google Threat Intelligence Group (GTIG) knows about zero-day exploitation in 2024. We discuss how targeted vendors and exploited products drive trends that reflect threat actor goals and shifting exploitation approaches, and then closely examine several examples of zero-day exploitation from...
The 2025 Verizon Data Breach Investigations Report (DBIR) reveals that vulnerability exploitation was present in 20% of breaches — a 34% increase year-over-year. To support the report, Tenable Research contributed enriched data on the most exploited vulnerabilities. In this blog, we analyze 17 edge-related CVEs and remediation trends across industry sectors.BackgroundSince 2008, Verizon’s annual Data Breach Investigations Report (DBIR) has helped organizations understand evolving cyber threats. For the 2025 edition, Tenable Research contributed enriched data on the most exploited vulnerabilities of the past year. We analyzed over 160 million data points and zeroed-in on the 17 edge device CVEs featured in the DBIR to understand their average remediation times. In this blog, we take a closer look at these vulnerabilities, revealing industry-specific trends and highlighting where patching still lags — often by months.In this year’s DBIR, vulnerabilities in Virtual Private Networks (VPNs) and edge devices were particular areas of concern, accounting for 22% of the CVE-related breaches in this year’s report, almost eight times the amount of 3% found in the 2024 report.AnalysisThe 2025 DBIR found that exploitation of vulnerabilities surged to be one of the top initial access vectors for 20% of data breaches. This represents a 34% increase over last year’s report and is driven in part by the zero-day exploitation of VPN and edge device vulnerabilities – asset classes that traditional endpoint detection and response (EDR) vendors struggle to assess effectively. The DBIR calls special attention to 17 CVEs affecting these edge devices, which remain valuable targets for attackers. Tenable Research analyzed these 17 CVEs and evaluated which industries had the best and worst remediation rates across the vulnerabilities. As a primer, the table below provides this list of CVEs and details for each, including their Common Vulnerability Scoring System (CVSS) and Tenable...

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

w2xim3/CVE-2023-46805

Type: github • Created: 2024-01-25 14:53:16 UTC • Stars: 2

CVE-2023-46805 Ivanti POC RCE - Ultra fast scanner.

Chocapikk/CVE-2023-46805

Type: github • Created: 2024-01-19 02:23:13 UTC • Stars: 12

Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research

raminkarimkhani1996/CVE-2023-46805_CVE-2024-21887

Type: github • Created: 2024-01-18 13:25:46 UTC • Stars: 5

The script in this repository only checks whether the vulnerabilities specified in the Ivanti Connect Secure product exist.

duy-31/CVE-2023-46805_CVE-2024-21887

Type: github • Created: 2024-01-16 19:40:59 UTC • Stars: 21

An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks.

cbeek-r7/CVE-2023-46805

Type: github • Created: 2024-01-16 08:05:58 UTC • Stars: 5

Simple scanner for scanning a list of ip-addresses for vulnerable Ivanti Pulse Secure devices

yoryio/CVE-2023-46805

Type: github • Created: 2024-01-14 18:30:11 UTC • Stars: 10

Scanner for CVE-2023-46805 - Ivanti Connect Secure

Timeline

  • CVE ID Reserved

  • Added to KEVIntel

  • CVE Published to Public

  • Proof of Concept Exploit Available

  • Detected by Nessus

  • Detected by Nuclei

  • Detected by Metasploit