- Description
- A directory traversal vulnerability exists in Ivanti LANDesk Management Gateway through 4.2-1.9. By appending %3F.php to the URI of the /client/index.php endpoint, an attacker can bypass access controls and gain unauthorized access to various endpoints such as /client/index.php%3F.php/gsb/firewall.php within the management web panel, potentially exposing sensitive device information. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
- Source
- cve@mitre.org
- NVD status
- Awaiting Analysis
- CNA Tags
- unsupported-when-assigned
CVSS 3.1
- Type
- Secondary
- Base score
- 5.8
- Impact score
- 1.4
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
- Severity
- MEDIUM
- cve@mitre.org
- CWE-180
- Hype score
- Not currently trending
New post from https://t.co/uXvPWJy6tj (CVE-2025-43716 | Ivanti LANDesk Management Suite up to 4.2-1.9 /client/index.php incorrect behavior order: validate before canonicalize) has been published on https://t.co/BnwqTSrIYB
@WolfgangSesin
23 Apr 2025
8 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-43716 A directory traversal vulnerability exists in Ivanti LANDesk Management Gateway through 4.2-1.9. By appending %3F.php to the URI of the /client/index.php endpoint, an… https://t.co/oD6FaSYTEi
@CVEnew
23 Apr 2025
389 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes