{"uuid": "504992f7-3793-4582-b8ab-ad1fbd120aaa", "vulnerability": {"vulnId": "CVE-2024-8190", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "504992f7-3793-4582-b8ab-ad1fbd120aaa"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2024-09-13T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2024-09-13T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2024-09-13T00:00:00Z"}, "scope": {"notes": "KEV entry: Ivanti Cloud Services Appliance OS Command Injection Vulnerability | Affected: Ivanti / Cloud Services Appliance | Description: Ivanti Cloud Services Appliance (CSA) contains an OS command injection vulnerability in the administrative console which can allow an authenticated attacker with application admin privileges to pass commands to the underlying OS. | Required action: As Ivanti CSA has reached End-of-Life status, users are urged to remove CSA 4.6.x from service or upgrade to the 5.0.x line of supported solutions, as future vulnerabilities on the 4.6.x version of CSA are unlikely to receive future security updates. | Due date: 2024-10-04 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Cloud-Service-Appliance-CSA-CVE-2024-8190; https://nvd.nist.gov/vuln/detail/CVE-2024-8190"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-78"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Cloud Services Appliance", "due_date": "2024-10-04", "date_added": "2024-09-13", "vendorProject": "Ivanti", "vulnerabilityName": "Ivanti Cloud Services Appliance OS Command Injection Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2024-8190", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2024-8190"}]}
