PatchSiren

PatchSiren cyber security CVE debrief

CVE-2021-22899 Ivanti CVE debrief

CVE-2021-22899 is a command injection vulnerability affecting Ivanti Pulse Connect Secure. CISA included it in the Known Exploited Vulnerabilities catalog on 2021-11-03, which means defenders should treat it as a high-priority patching item. CISA’s guidance points to applying updates per the vendor’s instructions and references Emergency Directive 21-03 for additional requirements and deadlines.

Vendor
Ivanti
Product
Pulse Connect Secure
CVSS
Unknown
CISA KEV
Listed
Original CVE published
2021-11-03
Original CVE updated
2021-11-03
Advisory published
2021-11-03
Advisory updated
2021-11-03

Who should care

Organizations that use Ivanti Pulse Connect Secure, especially teams responsible for remote access infrastructure, perimeter appliances, vulnerability management, and incident response.

Technical summary

The public record provided here identifies the issue as a command injection vulnerability in Ivanti Pulse Connect Secure. The most important operational detail is that CISA added it to the Known Exploited Vulnerabilities catalog on 2021-11-03, indicating known exploitation risk. The supplied CISA guidance recommends applying updates per vendor instructions and following ED 21-03 for further direction. No additional technical details should be assumed beyond the supplied record.

Defensive priority

Urgent. KEV-listed vulnerabilities deserve immediate remediation planning because CISA has determined they are actively exploited or pose known exploitation risk. For this CVE, the source guidance is to apply vendor updates and align with ED 21-03 requirements.

Recommended defensive actions

  • Apply Ivanti-recommended updates for Pulse Connect Secure as soon as possible.
  • Review CISA Emergency Directive 21-03 for any required mitigation steps or deadlines.
  • Confirm whether any Pulse Connect Secure appliances are exposed or in critical remote-access paths.
  • Inventory affected systems and track remediation until completion.
  • Use vendor and CISA guidance only; do not rely on compensating controls as a substitute for patching.

Evidence notes

This debrief is based only on the supplied CISA KEV source item and the official links provided. The source identifies the product as Ivanti Pulse Connect Secure, classifies the issue as a command injection vulnerability, and states the required action: apply updates per vendor instructions. It also notes that ED 21-03 provides further guidance and that the due date associated with the directive is 2022-05-03. No unsupported impact, version, or exploitation details were added.

Official resources

CVE published and modified on 2021-11-03. CISA KEV entry date: 2021-11-03. The source references an ED 21-03 due date of 2022-05-03. This summary uses only the supplied official sources and does not infer details beyond them.