{"api_version":"1","generated_at":"2026-04-22T23:31:08+00:00","cve":"CVE-2023-46805","urls":{"html":"https://cve.report/CVE-2023-46805","api":"https://cve.report/api/cve/CVE-2023-46805.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-46805","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-46805"},"summary":{"title":"Ivanti Connect Secure and Policy Secure Authentication Bypass Vulnerability","description":"Ivanti Connect Secure (ICS, formerly known as Pulse Connect Secure) and Ivanti Policy Secure gateways contain an authentication bypass vulnerability in the web component that allows an attacker to access restricted resources by bypassing control checks. This vulnerability can be leveraged in conjunction with CVE-2024-21887, a command injection vulnerability.","state":"RESERVED","assigner":"cve@mitre.org","published_at":"2024-01-10","updated_at":"2023-10-27 02:09:44"},"problem_types":[],"metrics":[],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-2023-46805","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-46805","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":{"cve_year":"2023","cve_id":"46805","cve":"CVE-2023-46805","vendorProject":"Ivanti","product":"Connect Secure and Policy Secure","vulnerabilityName":"Ivanti Connect Secure and Policy Secure Authentication Bypass Vulnerability","dateAdded":"2024-01-10","shortDescription":"Ivanti Connect Secure (ICS, formerly known as Pulse Connect Secure) and Ivanti Policy Secure gateways contain an authentication bypass vulnerability in the web component that allows an attacker to access restricted resources by bypassing control checks. This vulnerability can be leveraged in conjunction with CVE-2024-21887, a command injection vulnerability.","requiredAction":"Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.","dueDate":"2024-01-22","knownRansomwareCampaignUse":"Known","notes":"Please apply mitigations per vendor instructions. For more information, please see: https://forums.ivanti.com/s/article/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US ;  https://nvd.nist.gov/vuln/detail/CVE-2023-46805","cwes":"CWE-287","catalogVersion":"2026.04.22","updated_at":"2026-04-22 20:03:10"},"epss":{"cve_year":"2023","cve_id":"46805","cve":"CVE-2023-46805","epss":"0.944130000","percentile":"0.999780000","score_date":"2026-04-21","updated_at":"2026-04-22 00:07:42"},"legacy_qids":[{"cve":"CVE-2023-46805","qid":"150785","title":"Ivanti Connect Secure (ICS) and Ivanti Policy Secure Gateways Authentication Bypass Vulnerability (CVE-2023-46805)"},{"cve":"CVE-2023-46805","qid":"731074","title":"Ivanti Connect Secure (ICS) and Ivanti Policy Secure Gateway Multiple Vulnerabilities"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2023-46805","ASSIGNER":"cve@mitre.org","STATE":"RESERVED"},"description":{"description_data":[{"lang":"eng","value":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."}]}},"nvd":{"publishedDate":null,"lastModifiedDate":null,"problem_types":[],"metrics":[],"configurations":[]},"legacy_mitre":{"record":null,"notes":[]}}}