Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-3483

Summary
Assigner-ivanti
Assigner Org ID-3c1d8aa1-5a33-4ea4-8992-aadd6440af75
Published At-10 Mar, 2026 | 14:19
Updated At-11 Mar, 2026 | 03:56
Rejected At-
Credits

An exposed dangerous method in Ivanti DSM before version 2026.1.1 allows a local authenticated attacker to escalate their privileges.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:ivanti
Assigner Org ID:3c1d8aa1-5a33-4ea4-8992-aadd6440af75
Published At:10 Mar, 2026 | 14:19
Updated At:11 Mar, 2026 | 03:56
Rejected At:
▼CVE Numbering Authority (CNA)

An exposed dangerous method in Ivanti DSM before version 2026.1.1 allows a local authenticated attacker to escalate their privileges.

Affected Products
Vendor
Ivanti SoftwareIvanti
Product
Desktop and Server Management
Default Status
affected
Versions
Unaffected
  • 2026.1.1
Problem Types
TypeCWE IDDescription
CWECWE-749CWE-749 Exposed dangerous method or function
Type: CWE
CWE ID: CWE-749
Description: CWE-749 Exposed dangerous method or function
Metrics
VersionBase scoreBase severityVector
3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-500CAPEC-500 WebView Injection
CAPEC ID: CAPEC-500
Description: CAPEC-500 WebView Injection
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://hub.ivanti.com/s/article/Security-Advisory-Ivanti-DSM-CVE-2026-3483?language=en_US
N/A
Hyperlink: https://hub.ivanti.com/s/article/Security-Advisory-Ivanti-DSM-CVE-2026-3483?language=en_US
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:3c1d8aa1-5a33-4ea4-8992-aadd6440af75
Published At:10 Mar, 2026 | 18:19
Updated At:12 Mar, 2026 | 13:58

An exposed dangerous method in Ivanti DSM before version 2026.1.1 allows a local authenticated attacker to escalate their privileges.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Ivanti Software
ivanti
>>desktop_\&_server_management>>Versions before 2026.1.1(exclusive)
cpe:2.3:a:ivanti:desktop_\&_server_management:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-749Primary3c1d8aa1-5a33-4ea4-8992-aadd6440af75
CWE ID: CWE-749
Type: Primary
Source: 3c1d8aa1-5a33-4ea4-8992-aadd6440af75
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://hub.ivanti.com/s/article/Security-Advisory-Ivanti-DSM-CVE-2026-3483?language=en_US3c1d8aa1-5a33-4ea4-8992-aadd6440af75
Vendor Advisory
Hyperlink: https://hub.ivanti.com/s/article/Security-Advisory-Ivanti-DSM-CVE-2026-3483?language=en_US
Source: 3c1d8aa1-5a33-4ea4-8992-aadd6440af75
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

53Records found

CVE-2023-41725
Matching Score-8
Assigner-HackerOne
ShareView Details
Matching Score-8
Assigner-HackerOne
CVSS Score-7.8||HIGH
EPSS-0.18% / 39.20%
||
7 Day CHG~0.00%
Published-03 Nov, 2023 | 18:13
Updated-05 Sep, 2024 | 15:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Ivanti Avalanche EnterpriseServer Service Unrestricted File Upload Local Privilege Escalation Vulnerability

Action-Not Available
Vendor-Ivanti Software
Product-avalancheAvalancheavalanche
CWE ID-CWE-434
Unrestricted Upload of File with Dangerous Type
CVE-2023-41726
Matching Score-8
Assigner-HackerOne
ShareView Details
Matching Score-8
Assigner-HackerOne
CVSS Score-7.8||HIGH
EPSS-0.06% / 18.98%
||
7 Day CHG~0.00%
Published-03 Nov, 2023 | 18:13
Updated-06 Sep, 2024 | 19:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Ivanti Avalanche Incorrect Default Permissions allows Local Privilege Escalation Vulnerability

Action-Not Available
Vendor-Ivanti Software
Product-avalancheAvalancheavalanche
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2023-41718
Matching Score-8
Assigner-HackerOne
ShareView Details
Matching Score-8
Assigner-HackerOne
CVSS Score-7.8||HIGH
EPSS-0.27% / 50.09%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 23:18
Updated-07 Jan, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

When a particular process flow is initiated, an attacker may be able to gain unauthorized elevated privileges on the affected system when having control over a specific file.

Action-Not Available
Vendor-Ivanti SoftwareMicrosoft Corporation
Product-windowssecure_access_clientSecure Access
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2023-38543
Matching Score-8
Assigner-HackerOne
ShareView Details
Matching Score-8
Assigner-HackerOne
CVSS Score-8.8||HIGH
EPSS-0.19% / 40.77%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 23:18
Updated-07 Jan, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability exists on all versions of the Ivanti Secure Access Client below 22.6R1.1, which could allow a locally authenticated attacker to exploit a vulnerable configuration, potentially leading to a denial of service (DoS) condition on the user machine.

Action-Not Available
Vendor-Ivanti SoftwareMicrosoft Corporation
Product-windowssecure_access_clientSecure Access Client Windows
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2023-38043
Matching Score-8
Assigner-HackerOne
ShareView Details
Matching Score-8
Assigner-HackerOne
CVSS Score-8.8||HIGH
EPSS-0.21% / 43.03%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 23:18
Updated-12 Aug, 2024 | 15:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability exists on all versions of the Ivanti Secure Access Client below 22.6R1.1, which could allow a locally authenticated attacker to exploit a vulnerable configuration, potentially leading to a denial of service (DoS) condition on the user machine and, in some cases, resulting in a full compromise of the system.

Action-Not Available
Vendor-Ivanti SoftwareMicrosoft Corporation
Product-windowssecure_access_clientSecure Access Client Windowssecure_access_client_windows
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2024-9845
Matching Score-8
Assigner-Ivanti
ShareView Details
Matching Score-8
Assigner-Ivanti
CVSS Score-7.8||HIGH
EPSS-0.34% / 56.82%
||
7 Day CHG+0.09%
Published-11 Dec, 2024 | 16:41
Updated-19 Dec, 2024 | 04:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Under specific circumstances, insecure permissions in Ivanti Automation before version 2024.4.0.1 allows a local authenticated attacker to achieve local privilege escalation.

Action-Not Available
Vendor-Ivanti Software
Product-automationAutomation
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2024-9167
Matching Score-8
Assigner-Ivanti
ShareView Details
Matching Score-8
Assigner-Ivanti
CVSS Score-7.8||HIGH
EPSS-0.38% / 59.49%
||
7 Day CHG~0.00%
Published-08 Oct, 2024 | 16:26
Updated-13 Aug, 2025 | 00:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Under specific circumstances, insecure permissions in Ivanti Velocity License Server before version 5.2 allows a local authenticated attacker to achieve local privilege escalation.

Action-Not Available
Vendor-Ivanti Software
Product-velocity_license_serverVelocity License Servervelocity_license_server
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2021-36235
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.30% / 53.61%
||
7 Day CHG~0.00%
Published-01 Sep, 2021 | 00:19
Updated-04 Aug, 2024 | 00:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Ivanti Workspace Control before 10.6.30.0. A locally authenticated user with low privileges can bypass File and Folder Security by leveraging an unspecified attack vector. As a result, the attacker can start applications with elevated privileges.

Action-Not Available
Vendor-n/aIvanti Software
Product-workspace_controln/a
CVE-2024-8496
Matching Score-8
Assigner-Ivanti
ShareView Details
Matching Score-8
Assigner-Ivanti
CVSS Score-7.8||HIGH
EPSS-0.46% / 64.41%
||
7 Day CHG+0.12%
Published-11 Dec, 2024 | 16:43
Updated-14 Dec, 2024 | 04:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Under specific circumstances, insecure permissions in Ivanti Workspace Control before version 10.18.40.0 allows a local authenticated attacker to achieve local privilege escalation.

Action-Not Available
Vendor-Ivanti Software
Product-workspace_controlWorkspace Control
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2024-7571
Matching Score-8
Assigner-Ivanti
ShareView Details
Matching Score-8
Assigner-Ivanti
CVSS Score-7.8||HIGH
EPSS-0.22% / 44.21%
||
7 Day CHG~0.00%
Published-12 Nov, 2024 | 16:14
Updated-17 Jan, 2025 | 19:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect permissions in Ivanti Secure Access Client before 22.7R4 allows a local authenticated attacker to escalate their privileges.

Action-Not Available
Vendor-Ivanti SoftwareMicrosoft Corporation
Product-windowssecure_access_clientSecure Access Clientsecure_access_client
CWE ID-CWE-267
Privilege Defined With Unsafe Actions
CVE-2024-8012
Matching Score-8
Assigner-Ivanti
ShareView Details
Matching Score-8
Assigner-Ivanti
CVSS Score-7.8||HIGH
EPSS-0.09% / 25.01%
||
7 Day CHG~0.00%
Published-10 Sep, 2024 | 20:37
Updated-12 Jun, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An authentication bypass weakness in the message broker service of Ivanti Workspace Control before version 2025.2 (10.19.0.0) allows a local authenticated attacker to escalate their privileges.

Action-Not Available
Vendor-Ivanti Software
Product-workspace_controlWorkspace Controlworkspace_control
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-28129
Matching Score-8
Assigner-HackerOne
ShareView Details
Matching Score-8
Assigner-HackerOne
CVSS Score-7.8||HIGH
EPSS-0.53% / 67.07%
||
7 Day CHG-0.09%
Published-10 Aug, 2023 | 19:07
Updated-09 Oct, 2024 | 19:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DSM 2022.2 SU2 and all prior versions allows a local low privileged account to execute arbitrary OS commands as the DSM software installation user.

Action-Not Available
Vendor-Ivanti Software
Product-desktop_\&_server_managementDesktop & Server Management (DSM)
CVE-2024-37398
Matching Score-8
Assigner-HackerOne
ShareView Details
Matching Score-8
Assigner-HackerOne
CVSS Score-7.8||HIGH
EPSS-0.36% / 58.00%
||
7 Day CHG~0.00%
Published-13 Nov, 2024 | 01:54
Updated-13 Mar, 2025 | 17:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient validation in Ivanti Secure Access Client before 22.7R4 allows a local authenticated attacker to escalate their privileges.

Action-Not Available
Vendor-Ivanti Software
Product-secure_access_clientSecure Access Clientsecure_access_client
CVE-2024-47906
Matching Score-8
Assigner-Ivanti
ShareView Details
Matching Score-8
Assigner-Ivanti
CVSS Score-7.8||HIGH
EPSS-0.37% / 58.98%
||
7 Day CHG~0.00%
Published-12 Nov, 2024 | 15:59
Updated-17 Jan, 2025 | 20:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Excessive binary privileges in Ivanti Connect Secure before version 22.7R2.3 (Not Applicable to 9.1Rx) and Ivanti Policy Secure before version 22.7R1.2 (Not Applicable to 9.1Rx) allows a local authenticated attacker to escalate privileges.

Action-Not Available
Vendor-Ivanti Software
Product-connect_securepolicy_securePolicy SecureConnect Securepolicy_secureconnect_secure
CWE ID-CWE-267
Privilege Defined With Unsafe Actions
CWE ID-CWE-426
Untrusted Search Path
CVE-2024-44103
Matching Score-8
Assigner-Ivanti
ShareView Details
Matching Score-8
Assigner-Ivanti
CVSS Score-8.8||HIGH
EPSS-0.48% / 65.15%
||
7 Day CHG~0.00%
Published-10 Sep, 2024 | 20:39
Updated-12 Jun, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DLL hijacking in the management console of Ivanti Workspace Control before version 2025.2 (10.19.0.0) allows a local authenticated attacker to escalate their privileges.

Action-Not Available
Vendor-Ivanti Software
Product-workspace_controlWorkspace Controlautomation
CWE ID-CWE-426
Untrusted Search Path
CVE-2024-44104
Matching Score-8
Assigner-Ivanti
ShareView Details
Matching Score-8
Assigner-Ivanti
CVSS Score-8.8||HIGH
EPSS-0.49% / 65.73%
||
7 Day CHG~0.00%
Published-10 Sep, 2024 | 20:41
Updated-12 Jun, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An incorrectly implemented authentication scheme that is subjected to a spoofing attack in the management console of Ivanti Workspace Control before version 2025.2 (10.19.0.0) allows a local authenticated attacker to escalate their privileges.

Action-Not Available
Vendor-Ivanti Software
Product-workspace_controlWorkspace Controlautomation
CWE ID-CWE-290
Authentication Bypass by Spoofing
CVE-2024-44106
Matching Score-8
Assigner-Ivanti
ShareView Details
Matching Score-8
Assigner-Ivanti
CVSS Score-8.8||HIGH
EPSS-0.65% / 70.96%
||
7 Day CHG~0.00%
Published-10 Sep, 2024 | 20:45
Updated-12 Jun, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient server-side controls in the management console of Ivanti Workspace Control before version 2025.2 (10.19.0.0) allows a local authenticated attacker to escalate their privileges.

Action-Not Available
Vendor-Ivanti Software
Product-workspace_controlWorkspace Controlautomation
CWE ID-CWE-602
Client-Side Enforcement of Server-Side Security
CVE-2025-22455
Matching Score-8
Assigner-Ivanti
ShareView Details
Matching Score-8
Assigner-Ivanti
CVSS Score-8.8||HIGH
EPSS-0.30% / 53.69%
||
7 Day CHG~0.00%
Published-10 Jun, 2025 | 14:38
Updated-26 Feb, 2026 | 17:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A hardcoded key in Ivanti Workspace Control before version 10.19.0.0 allows a local authenticated attacker to decrypt stored SQL credentials.

Action-Not Available
Vendor-Ivanti Software
Product-workspace_controlWorkspace Control
CWE ID-CWE-321
Use of Hard-coded Cryptographic Key
CVE-2024-44105
Matching Score-8
Assigner-Ivanti
ShareView Details
Matching Score-8
Assigner-Ivanti
CVSS Score-8.2||HIGH
EPSS-0.19% / 40.94%
||
7 Day CHG~0.00%
Published-10 Sep, 2024 | 20:43
Updated-12 Jun, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cleartext transmission of sensitive information in the management console of Ivanti Workspace Control before version 2025.2 (10.19.0.0) allows a local authenticated attacker to obtain OS credentials.

Action-Not Available
Vendor-Ivanti Software
Product-workspace_controlWorkspace Controlautomation
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-44107
Matching Score-8
Assigner-Ivanti
ShareView Details
Matching Score-8
Assigner-Ivanti
CVSS Score-8.8||HIGH
EPSS-0.44% / 63.24%
||
7 Day CHG~0.00%
Published-10 Sep, 2024 | 20:47
Updated-12 Jun, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DLL hijacking in the management console of Ivanti Workspace Control before version 2025.2 (10.19.0.0) allows a local authenticated attacker to escalate their privileges and achieve arbitrary code execution.

Action-Not Available
Vendor-Ivanti Software
Product-workspace_controlWorkspace Controlworkspace_control
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2024-39709
Matching Score-8
Assigner-HackerOne
ShareView Details
Matching Score-8
Assigner-HackerOne
CVSS Score-7.8||HIGH
EPSS-0.12% / 30.22%
||
7 Day CHG~0.00%
Published-13 Nov, 2024 | 01:54
Updated-16 Jul, 2025 | 00:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect file permissions in Ivanti Connect Secure before version 22.6R2 (Not Applicable to 9.1Rx) and Ivanti Policy Secure before version 22.7R1 (Not Applicable to 9.1Rx) allow a local authenticated attacker to escalate their privileges.

Action-Not Available
Vendor-Ivanti Software
Product-policy_secureconnect_securePolicy SecureConnect Securepolicy_secureconnect_secure
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2024-7612
Matching Score-8
Assigner-Ivanti
ShareView Details
Matching Score-8
Assigner-Ivanti
CVSS Score-8.8||HIGH
EPSS-0.18% / 39.79%
||
7 Day CHG~0.00%
Published-08 Oct, 2024 | 16:17
Updated-18 Dec, 2024 | 18:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure permissions in Ivanti EPMM before 12.1.0.4 allow a local authenticated attacker to modify sensitive application components.

Action-Not Available
Vendor-Ivanti Software
Product-endpoint_manager_mobileEndpoint Manager Mobileendpoint_manager_mobile
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2024-11598
Matching Score-8
Assigner-Ivanti
ShareView Details
Matching Score-8
Assigner-Ivanti
CVSS Score-7.8||HIGH
EPSS-0.34% / 56.82%
||
7 Day CHG+0.09%
Published-11 Dec, 2024 | 16:50
Updated-23 Jan, 2025 | 20:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Under specific circumstances, insecure permissions in Ivanti Application Control before version 2024.3 HF1, 2024.1 HF2, or 2023.3 HF3 allows a local authenticated attacker to achieve local privilege escalation.

Action-Not Available
Vendor-Ivanti Software
Product-application_controlApplication Control
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2024-10251
Matching Score-8
Assigner-Ivanti
ShareView Details
Matching Score-8
Assigner-Ivanti
CVSS Score-7.8||HIGH
EPSS-0.46% / 64.41%
||
7 Day CHG+0.12%
Published-11 Dec, 2024 | 16:40
Updated-20 Dec, 2024 | 04:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Under specific circumstances, insecure permissions in Ivanti Security Controls before version 2024.4.1 allows a local authenticated attacker to achieve local privilege escalation.

Action-Not Available
Vendor-Ivanti Software
Product-security_controlsSecurity Controls
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2022-43555
Matching Score-8
Assigner-HackerOne
ShareView Details
Matching Score-8
Assigner-HackerOne
CVSS Score-7.8||HIGH
EPSS-0.08% / 24.34%
||
7 Day CHG~0.00%
Published-03 Nov, 2023 | 18:13
Updated-04 Sep, 2024 | 20:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Ivanti Avalanche Printer Device Service Missing Authentication Local Privilege Escalation Vulnerability

Action-Not Available
Vendor-Ivanti Software
Product-avalancheAvalanche
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2022-43554
Matching Score-8
Assigner-HackerOne
ShareView Details
Matching Score-8
Assigner-HackerOne
CVSS Score-7.8||HIGH
EPSS-0.08% / 24.34%
||
7 Day CHG~0.00%
Published-03 Nov, 2023 | 18:13
Updated-05 Sep, 2024 | 20:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Ivanti Avalanche Smart Device Service Missing Authentication Local Privilege Escalation Vulnerability

Action-Not Available
Vendor-Ivanti Software
Product-avalancheAvalancheavalanche
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2022-44569
Matching Score-8
Assigner-HackerOne
ShareView Details
Matching Score-8
Assigner-HackerOne
CVSS Score-8.8||HIGH
EPSS-0.24% / 47.22%
||
7 Day CHG~0.00%
Published-03 Nov, 2023 | 18:13
Updated-05 Sep, 2024 | 20:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A locally authenticated attacker with low privileges can bypass authentication due to insecure inter-process communication.

Action-Not Available
Vendor-Ivanti Software
Product-automationAutomationautomation
CWE ID-CWE-287
Improper Authentication
CVE-2020-13770
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.10% / 28.13%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 17:38
Updated-04 Aug, 2024 | 12:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Several services are accessing named pipes in Ivanti Endpoint Manager through 2020.1.1 with default or overly permissive security attributes; as these services run as user ‘NT AUTHORITY\SYSTEM’, the issue can be used to escalate privileges from a local standard or service account having SeImpersonatePrivilege (eg. user ‘NT AUTHORITY\NETWORK SERVICE’).

Action-Not Available
Vendor-n/aIvanti Software
Product-endpoint_managern/a
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2022-27088
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.14% / 33.81%
||
7 Day CHG~0.00%
Published-11 Apr, 2022 | 13:59
Updated-03 Aug, 2024 | 05:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Ivanti DSM Remote <= 6.3.1.1862 is vulnerable to an unquoted service path allowing local users to launch processes with elevated privileges.

Action-Not Available
Vendor-n/aIvanti Software
Product-dsm_remoten/a
CWE ID-CWE-428
Unquoted Search Path or Element
CVE-2025-22458
Matching Score-8
Assigner-Ivanti
ShareView Details
Matching Score-8
Assigner-Ivanti
CVSS Score-7.8||HIGH
EPSS-0.15% / 35.35%
||
7 Day CHG~0.00%
Published-08 Apr, 2025 | 14:25
Updated-26 Feb, 2026 | 18:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DLL hijacking in Ivanti Endpoint Manager before version 2024 SU1 or before version 2022 SU7 allows an authenticated attacker to escalate to System.

Action-Not Available
Vendor-Ivanti Software
Product-endpoint_managerEndpoint Manager
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2025-22460
Matching Score-8
Assigner-Ivanti
ShareView Details
Matching Score-8
Assigner-Ivanti
CVSS Score-7.8||HIGH
EPSS-0.18% / 39.51%
||
7 Day CHG~0.00%
Published-13 May, 2025 | 15:09
Updated-16 Jul, 2025 | 18:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Default credentials in Ivanti Cloud Services Application before version 5.0.5 allows a local authenticated attacker to escalate their privileges.

Action-Not Available
Vendor-Ivanti Software
Product-cloud_services_applianceCSA (Cloud Services Appliance)
CWE ID-CWE-1392
Use of Default Credentials
CVE-2025-11622
Matching Score-8
Assigner-Ivanti
ShareView Details
Matching Score-8
Assigner-Ivanti
CVSS Score-7.8||HIGH
EPSS-0.18% / 38.78%
||
7 Day CHG~0.00%
Published-13 Oct, 2025 | 21:07
Updated-26 Feb, 2026 | 17:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure deserialization in Ivanti Endpoint Manager before version 2024 SU4 allows a local authenticated attacker to escalate their privileges.

Action-Not Available
Vendor-Ivanti Software
Product-endpoint_managerEndpoint Manager
CWE ID-CWE-502
Deserialization of Untrusted Data
CVE-2024-13169
Matching Score-8
Assigner-Ivanti
ShareView Details
Matching Score-8
Assigner-Ivanti
CVSS Score-7.8||HIGH
EPSS-0.12% / 31.20%
||
7 Day CHG~0.00%
Published-14 Jan, 2025 | 17:18
Updated-26 Feb, 2026 | 19:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An out-of-bounds read in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a local authenticated attacker to escalate their privileges.

Action-Not Available
Vendor-Ivanti Software
Product-endpoint_managerEndpoint Manager
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-843
Access of Resource Using Incompatible Type ('Type Confusion')
CVE-2024-13164
Matching Score-8
Assigner-Ivanti
ShareView Details
Matching Score-8
Assigner-Ivanti
CVSS Score-7.8||HIGH
EPSS-0.12% / 31.20%
||
7 Day CHG~0.00%
Published-14 Jan, 2025 | 17:22
Updated-26 Feb, 2026 | 19:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An uninitialized resource in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a local authenticated attacker to escalate their privileges.

Action-Not Available
Vendor-Ivanti Software
Product-endpoint_managerEndpoint Manager
CWE ID-CWE-908
Use of Uninitialized Resource
CVE-2019-19675
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.08% / 23.88%
||
7 Day CHG~0.00%
Published-17 Dec, 2019 | 14:42
Updated-05 Aug, 2024 | 02:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Ivanti Workspace Control before 10.3.180.0. a locally authenticated user with low privileges can bypass Managed Application Security by leveraging an unspecified attack vector in Workspace Preferences, when it is enabled. As a result, the attacker can start applications that should be blocked.

Action-Not Available
Vendor-n/aIvanti Software
Product-workspace_controln/a
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2024-11597
Matching Score-8
Assigner-Ivanti
ShareView Details
Matching Score-8
Assigner-Ivanti
CVSS Score-7.8||HIGH
EPSS-0.34% / 56.82%
||
7 Day CHG+0.09%
Published-11 Dec, 2024 | 16:49
Updated-23 Jan, 2025 | 20:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Under specific circumstances, insecure permissions in Ivanti Performance Manager before version 2024.3 HF1, 2024.1 HF1, or 2023.3 HF1 allows a local authenticated attacker to achieve local privilege escalation.

Action-Not Available
Vendor-Ivanti Software
Product-performance_managerPerformance Manager
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2024-10630
Matching Score-8
Assigner-Ivanti
ShareView Details
Matching Score-8
Assigner-Ivanti
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.14%
||
7 Day CHG~0.00%
Published-14 Jan, 2025 | 16:49
Updated-26 Feb, 2026 | 19:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A race condition in Ivanti Application Control Engine before version 10.14.4.0 allows a local authenticated attacker to bypass the application blocking functionality.

Action-Not Available
Vendor-Ivanti Software
Product-application_controlsecurity_controlsApplication Control Engine
CWE ID-CWE-366
Race Condition within a Thread
CVE-2025-22454
Matching Score-8
Assigner-Ivanti
ShareView Details
Matching Score-8
Assigner-Ivanti
CVSS Score-7.8||HIGH
EPSS-0.28% / 50.96%
||
7 Day CHG-0.01%
Published-11 Mar, 2025 | 14:11
Updated-26 Feb, 2026 | 19:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficiently restrictive permissions in Ivanti Secure Access Client before 22.7R4 allows a local authenticated attacker to escalate their privileges.

Action-Not Available
Vendor-Ivanti Software
Product-secure_access_clientSecure Access Client
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2025-5353
Matching Score-8
Assigner-Ivanti
ShareView Details
Matching Score-8
Assigner-Ivanti
CVSS Score-8.8||HIGH
EPSS-0.30% / 53.69%
||
7 Day CHG~0.00%
Published-10 Jun, 2025 | 14:39
Updated-26 Feb, 2026 | 17:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A hardcoded key in Ivanti Workspace Control before version 10.19.10.0 allows a local authenticated attacker to decrypt stored SQL credentials.

Action-Not Available
Vendor-Ivanti Software
Product-workspace_controlWorkspace Control
CWE ID-CWE-321
Use of Hard-coded Cryptographic Key
CVE-2019-17066
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 19.51%
||
7 Day CHG~0.00%
Published-18 May, 2020 | 21:53
Updated-05 Aug, 2024 | 01:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Ivanti WorkSpace Control before 10.4.40.0, a user can elevate rights on the system by hijacking certain user registries. This is possible because pwrgrid.exe first checks the Current User registry hives (HKCU) when starting an application with elevated rights.

Action-Not Available
Vendor-n/aIvanti Software
Product-workspace_controln/a
CWE ID-CWE-269
Improper Privilege Management
CVE-2023-35080
Matching Score-8
Assigner-HackerOne
ShareView Details
Matching Score-8
Assigner-HackerOne
CVSS Score-8.8||HIGH
EPSS-0.54% / 67.64%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 23:18
Updated-07 Jan, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in the Ivanti Secure Access Windows client, which could allow a locally authenticated attacker to exploit a vulnerable configuration, potentially leading to various security risks, including the escalation of privileges, denial of service, or information disclosure.

Action-Not Available
Vendor-Ivanti SoftwareMicrosoft Corporation
Product-windowssecure_access_clientSecure Access Client
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2021-42128
Matching Score-6
Assigner-HackerOne
ShareView Details
Matching Score-6
Assigner-HackerOne
CVSS Score-9.8||CRITICAL
EPSS-16.89% / 94.99%
||
7 Day CHG~0.00%
Published-07 Dec, 2021 | 13:13
Updated-04 Aug, 2024 | 03:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An exposed dangerous function vulnerability exists in Ivanti Avalanche before 6.3.3 using inforail Service allows Privilege Escalation via Enterprise Server Service.

Action-Not Available
Vendor-n/aIvanti Software
Product-avalancheIvanti Avalanche
CWE ID-CWE-749
Exposed Dangerous Method or Function
CVE-2023-36853
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.8||HIGH
EPSS-0.03% / 10.10%
||
7 Day CHG~0.00%
Published-19 Jul, 2023 | 21:57
Updated-24 Oct, 2024 | 20:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Keysight Geolocation Server Exposed Dangerous Method or Function

​In Keysight Geolocation Server v2.4.2 and prior, a low privileged attacker could create a local ZIP file containing a malicious script in any location. The attacker could abuse this to load a DLL with SYSTEM privileges.

Action-Not Available
Vendor-keysightKeysight Technologies
Product-geolocation_serverN6845A Geolocation Server
CWE ID-CWE-749
Exposed Dangerous Method or Function
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2024-6510
Matching Score-4
Assigner-cirosec GmbH
ShareView Details
Matching Score-4
Assigner-cirosec GmbH
CVSS Score-7.8||HIGH
EPSS-0.04% / 12.19%
||
7 Day CHG~0.00%
Published-12 Sep, 2024 | 14:18
Updated-02 Oct, 2024 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local privilege escalation vulnerability in AVG Internet Security

Local Privilege Escalation in AVG Internet Security v24 on Windows allows a local unprivileged user to escalate privileges to SYSTEM via COM-Hijacking.

Action-Not Available
Vendor-avgAVGavg
Product-internet_securityInternet Securityinternet_security
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CWE ID-CWE-427
Uncontrolled Search Path Element
CWE ID-CWE-749
Exposed Dangerous Method or Function
CVE-2026-25266
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.01% / 1.52%
||
7 Day CHG~0.00%
Published-04 May, 2026 | 16:43
Updated-06 May, 2026 | 18:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Exposed dangerous function in windows host

Memory corruption while processing IOCTL command when device is in power-save state.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn7861xg101039_firmwarewsa8845h_firmwarewcd9378cx2000090wsa8832_firmwaresc8380xp_firmwarewcn7880fastconnect_7800_firmwarecolognewsa8832x2000094_firmwaresnapdragon_ar1_gen_1_firmwarefastconnect_6900x2000092wsa8840_firmwarewcn7861_firmwarex2000094xg101039cologne_firmwarex2000086_firmwarexg101002_firmwarexg101032wsa8840x2000086wsa8835_firmwarex2000090_firmwarewcd9385_firmwarewcd9378c_firmwaresc8380xpwsa8830x2000077xg101002wcd9380_firmwarefastconnect_6900_firmwaresnapdragon_ar1_gen_1x2000092_firmwarewcd9380wsa8845_firmwarefastconnect_7800x2000077_firmwarexg101032_firmwarewsa8835wcd9385wsa8845wcn7880_firmwarewsa8830_firmwarewsa8845hSnapdragon
CWE ID-CWE-749
Exposed Dangerous Method or Function
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-47353
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.77%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:19
Updated-26 Feb, 2026 | 17:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Exposed Dangerous Method or Function in Automotive Software platform based on QNX

Memory corruption while processing request sent from GVM.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa8775p_firmwareqca6797aq_firmwareqam8650psa8620psa8770p_firmwaresa7255pqamsrv1m_firmwaresa7255p_firmwaresa8620p_firmwareqam8255pqca6595_firmwareqamsrv1hqca6698aq_firmwaresa8255p_firmwareqam8775p_firmwareqca6595sa8255psa8650p_firmwaresa9000psrv1m_firmwaresa8770psa9000p_firmwaresrv1h_firmwaresa7775psa8775psa8650psrv1hsrv1mqam8775pqca6698aqqamsrv1mqam8255p_firmwareqca6797aqqam8650p_firmwaresa7775p_firmwareqamsrv1h_firmwareSnapdragon
CWE ID-CWE-749
Exposed Dangerous Method or Function
CVE-2025-47366
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.1||HIGH
EPSS-0.01% / 0.27%
||
7 Day CHG~0.00%
Published-02 Feb, 2026 | 15:20
Updated-26 Feb, 2026 | 15:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Exposed Dangerous Method or Function in HLOS

Cryptographic issue when a Trusted Zone with outdated code is triggered by a HLOS providing incorrect input.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcm5430sxr2350p_firmwaresm7675sxr2230psnapdragon_x72_5g_modem-rf_firmwareqcs6490snapdragon_8_gen_3_mobilewsa8845sm4635qcm6490_firmwaresm8750pqdx1011_firmwareqcn9011_firmwaresa8650psm6650p_firmwaresa4155p_firmwareqca6797aqqam8775p_firmwarewcd9375fastconnect_7800qca8337_firmwaressg2115psxr1230pssg2115p_firmwaresa6145p_firmwaresnapdragon_ar2_gen_1_firmwareqca6698aqqca6584au_firmwaresa8145p_firmwarewsa8815_firmwarewcd9390srv1lqcs4490qca6595ausnapdragon_7\+_gen_2_mobile_firmwareqam8295p_firmwarewcn7880qcm6490qcs5430sm8750qcn9011wsa8810_firmwarewcn3988_firmwareqcn9012_firmwaresxr2350pqca6574aqca8081qep8111_firmwareqcs6490_firmwareqcs9100_firmwareqcm4490sm8475p_firmwarefastconnect_6900_firmwarewcd9340_firmwaresnapdragon_x72_5g_modem-rfqrb5165mvideo_collaboration_vc3_firmwarefastconnect_6900sa7255pqca6584ausm7435_firmwaresa8150psa8775psg4150psa8155psnapdragon_680_4g_mobile_firmwareqru1032sm7675p_firmwaresm8750p_firmwareqcm5430_firmwareqfw7124qru1052qrb5165m_firmwaresnapdragon_6_gen_1_mobile_firmwareqamsrv1h_firmwareqmp1000_firmwaresrv1l_firmwareqca6688aqsnapdragon_x75_5g_modem-rf_firmwaresrv1msnapdragon_662_mobilesnapdragon_8_gen_1_mobile_firmwarewcn7861ar8035qru1052_firmwaresm8735_firmwarewcn3988qca6797aq_firmwareqdu1010_firmwaresnapdragon_4_gen_2_mobile_firmwaresa7775p_firmwaresnapdragon_685_4g_mobilewsa8840_firmwareqamsrv1mqca6678aq_firmwareqca6391_firmwareqca6696_firmwaresm6475_firmwareqcc710qcs7230_firmwaresw5100p_firmwaresxr2330pwcd9385qca6574snapdragon_w5\+_gen_1_wearablewcn3910_firmwarewcn6755sm8750_firmwaresnapdragon_680_4g_mobilevideo_collaboration_vc5snapdragon_685_4g_mobile_firmwareqru1062snapdragon_8_gen_1_mobilewcn6650_firmwareqfw7114_firmwarewcn6740sd_8_gen1_5gqca6574a_firmwareqam8620psnapdragon_7_gen_1_mobile_firmwareqca6595_firmwareqdx1010_firmwareqam8650psa8775p_firmwarewcd9370wcn7881sm7435snapdragon_8_gen_3_mobile_firmwaresa6150psnapdragon_662_mobile_firmwareqdx1011sw5100_firmwaresm6650qcs5430_firmwaresc8380xpsw5100psnapdragon_460_mobilesg4150p_firmwareqca6678aqqca6688aq_firmwaresm8650qwsa8835wcd9375_firmwarewsa8840wcd9378qcn6274_firmwarefastconnect_6700_firmwaresa8770psa8195pqfw7124_firmwarerobotics_rb5sm7635snapdragon_x32_5g_modem-rfsa8155p_firmwaresa8540p_firmwareqep8111snapdragon_8\+_gen_1_mobile_firmwaresnapdragon_4_gen_1_mobileqcn6224sxr2230p_firmwaresa6155pqcs615qcm4490_firmwaresm7675_firmwaresa8620psm8635_firmwaresa8255psnapdragon_480\+_5g_mobile_firmwareqca8695au_firmwareqcs615_firmwaresnapdragon_4_gen_1_mobile_firmwaresa8540psnapdragon_ar1_gen_1sa6145psa8145psnapdragon_auto_5g_modem-rf_gen_2_firmwarewsa8832wcn6740_firmwareqca6174asa7775psa8295psnapdragon_480_5g_mobile_firmwareqru1032_firmwaresnapdragon_x32_5g_modem-rf_firmwareqrb5165n_firmwaresa8150p_firmwaresxr2250psm7635p_firmwaresm7635pwsa8830sa8195p_firmwareqca6595wsa8835_firmwarewcd9385_firmwareqamsrv1hsm6225p_firmwaresnapdragon_695_5g_mobilevideo_collaboration_vc5_firmwarewcn6650snapdragon_8\+_gen_1_mobilesnapdragon_7_gen_1_mobilesm8635snapdragon_x35_5g_modem-rf_firmwarewsa8845h_firmwarewcn3950_firmwaresrv1hsnapdragon_ar2_gen_1ar8035_firmwaresm7675pwsa8845hsa6155p_firmwareqam8295pqca6698aq_firmwarewcd9340wcn3910wcd9370_firmwaresw5100sa7255p_firmwaresxr2330p_firmwarewcn7750_firmwaresa6150p_firmwaresnapdragon_auto_5g_modem-rf_gen_2wsa8832_firmwareqca6595au_firmwareflight_rb5_5g_firmwaresd_8_gen1_5g_firmwareqamsrv1m_firmwarewcd9390_firmwaresm8650q_firmwareqam8255p_firmwaresm8735wsa8815wcn7860_firmwarewcn7860fastconnect_6200_firmwareqrb5165nsxr1230p_firmwarewcn3950qmp1000sa4150pflight_rb5_5gsm8475pwcd9395fastconnect_6200wcn7750video_collaboration_vc3qcn9012sa4150p_firmwaresnapdragon_ar1_gen_1_firmwaresm6225pwsa8845_firmwaresa8770p_firmwareqfw7114sm8635psa4155psnapdragon_4_gen_2_mobileqcn6224_firmwareqam8775psm8635p_firmwarewcd9378_firmwaresa9000pwcn7861_firmwaresnapdragon_x75_5g_modem-rfsa8255p_firmwaressg2125pwcn7881_firmwaresrv1m_firmwareqcs4490_firmwaresnapdragon_x35_5g_modem-rfsm4635_firmwaresa8650p_firmwaresnapdragon_695_5g_mobile_firmwaresnapdragon_480\+_5g_mobilesm6475qdu1010wcn6755_firmwareqca8337wcn7880_firmwaresm6650_firmwareqca6574auqam8650p_firmwareqca8081_firmwaresxr2250p_firmwaresa9000p_firmwareqam8620p_firmwareqcc710_firmwareqam8255pfastconnect_6700qca6391srv1h_firmwaresm6650psa8620p_firmwareqca6574au_firmwaresnapdragon_460_mobile_firmwarewcd9380qcs7230snapdragon_w5\+_gen_1_wearable_firmwarewcd9380_firmwareqdx1010sc8380xp_firmwaresa8295p_firmwareqru1062_firmwareqca6174a_firmwarewsa8830_firmwareqcn6274qcs9100qca8695ausnapdragon_480_5g_mobilewcd9395_firmwarefastconnect_7800_firmwareqca6696sm7635_firmwaresnapdragon_6_gen_1_mobilesnapdragon_7\+_gen_2_mobilewsa8810ssg2125p_firmwareqca6574_firmwarerobotics_rb5_firmwareSnapdragon
CWE ID-CWE-749
Exposed Dangerous Method or Function
CVE-2026-20423
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.45%
||
7 Day CHG~0.00%
Published-02 Mar, 2026 | 08:37
Updated-30 Mar, 2026 | 13:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In wlan STA driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00465314; Issue ID: MSV-4956.

Action-Not Available
Vendor-MediaTek Inc.
Product-nbiot_sdkmt7902mt7922mt7927mt7920mt7925mt7921MediaTek chipset
CWE ID-CWE-749
Exposed Dangerous Method or Function
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-29880
Matching Score-4
Assigner-JetBrains s.r.o.
ShareView Details
Matching Score-4
Assigner-JetBrains s.r.o.
CVSS Score-4.2||MEDIUM
EPSS-0.00% / 0.02%
||
7 Day CHG~0.00%
Published-21 Mar, 2024 | 13:56
Updated-16 Dec, 2024 | 15:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In JetBrains TeamCity before 2023.11 users with access to the agent machine might obtain permissions of the user running the agent process

Action-Not Available
Vendor-JetBrains s.r.o.
Product-teamcityTeamCityteamcity
CWE ID-CWE-749
Exposed Dangerous Method or Function
CVE-2020-12927
Matching Score-4
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-4
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.8||HIGH
EPSS-0.05% / 14.03%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 19:09
Updated-04 Aug, 2024 | 12:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential vulnerability in a dynamically loaded AMD driver in AMD VBIOS Flash Tool SDK may allow any authenticated user to escalate privileges to NT authority system.

Action-Not Available
Vendor-n/aAdvanced Micro Devices, Inc.
Product-vbios_flash_tool_software_development_kitAMD VBIOS Flash Tool SDK
CWE ID-CWE-749
Exposed Dangerous Method or Function
  • Previous
  • 1
  • 2
  • Next
Details not found