A critical vulnerability, identified as CVE-2023-46808, has been unveiled, posing a severe threat to all supported versions of Ivanti Neurons for ITSM. This authenticated remote file write exploiA critical vulnerability, labeled as CVE-2023-46808, has been uncovered, casting a shadow over all supported versions of Ivanti Neurons for ITSM, including 2023.3, 2023.2, and 2023.1, with older versions also deemed at risk. The exploit enables an authenticated remote user to conduct file writes to the ITSM server, potentially leading to the writing of files to sensitive directories and the execution of commands within the context of the web application’s user.
This presents a high-severity risk, as reflected in the CVSS score of 9.9, underscoring the urgent need for action to mitigate this vulnerability. On-premises customers are strongly advised to promptly apply the available patch through the standard download portal to ensure comprehensive protection against potential exploits. Notably, cloud customers are reassured that the patch has already been applied to all Ivanti Neurons for ITSM Cloud landscapes and no further action is required.
Moreover, the absence of reported customer exploitation at the time of disclosure provides a window of opportunity for proactive remediation. Detailed instructions and additional support are available through the Knowledge Base Article and the Success Portal, ensuring comprehensive guidance for addressing this critical security concern.
Additionally, acknowledgement is extended to Sebastian Puttkammer of SSC Prime Sec GmbH for their collaborative efforts in addressing this vulnerability, reaffirming the significance of coordinated industry collaboration in securing software environments.t has the potential to enable attackers to write files to sensitive directories and execute commands within the web application’s user context, with a CVSS score of 9.9. Immediate action is strongly encouraged for on-prem customers to apply the available patch and mitigate this significant security risk.