Home Ivanti CVE-2024-38655
Back to Ivanti

CVE-2024-38655

Ivanti Connect Secure - Admin Interface

Ivanti CVSS 7.2 Updated March 16, 2026

Executive Risk Summary

"A remote authenticated attacker with admin privileges can exploit an argument injection vulnerability in Ivanti Connect Secure before version 22.7R2.1 and 9.1R18.9 to achieve remote code execution. This vulnerability poses a significant risk to the security and integrity of the affected systems, as it allows attackers to execute arbitrary code with elevated privileges."

Operational Audit Arsenal

Target Type Web Application
Target Asset admin.cgi
Standard Path /opt/ivanti/connectsecure/admin

Manual Verification Required

This is a non-Windows asset (Ivanti). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Likely

Moderate

Internal Work Notes

Apply Ivanti Connect Secure version 22.7R2.1 or 9.1R18.9 to mitigate argument injection vulnerability (CVE-2024-38655) allowing remote code execution with admin privileges.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Ivanti Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.