PatchSiren cyber security CVE debrief
CVE-2021-22899 Ivanti CVE debrief
CVE-2021-22899 is a command injection vulnerability affecting Ivanti Pulse Connect Secure. CISA included it in the Known Exploited Vulnerabilities catalog on 2021-11-03, which means defenders should treat it as a high-priority patching item. CISA’s guidance points to applying updates per the vendor’s instructions and references Emergency Directive 21-03 for additional requirements and deadlines.
- Vendor
- Ivanti
- Product
- Pulse Connect Secure
- CVSS
- Unknown
- CISA KEV
- Listed
- Original CVE published
- 2021-11-03
- Original CVE updated
- 2021-11-03
- Advisory published
- 2021-11-03
- Advisory updated
- 2021-11-03
Who should care
Organizations that use Ivanti Pulse Connect Secure, especially teams responsible for remote access infrastructure, perimeter appliances, vulnerability management, and incident response.
Technical summary
The public record provided here identifies the issue as a command injection vulnerability in Ivanti Pulse Connect Secure. The most important operational detail is that CISA added it to the Known Exploited Vulnerabilities catalog on 2021-11-03, indicating known exploitation risk. The supplied CISA guidance recommends applying updates per vendor instructions and following ED 21-03 for further direction. No additional technical details should be assumed beyond the supplied record.
Defensive priority
Urgent. KEV-listed vulnerabilities deserve immediate remediation planning because CISA has determined they are actively exploited or pose known exploitation risk. For this CVE, the source guidance is to apply vendor updates and align with ED 21-03 requirements.
Recommended defensive actions
- Apply Ivanti-recommended updates for Pulse Connect Secure as soon as possible.
- Review CISA Emergency Directive 21-03 for any required mitigation steps or deadlines.
- Confirm whether any Pulse Connect Secure appliances are exposed or in critical remote-access paths.
- Inventory affected systems and track remediation until completion.
- Use vendor and CISA guidance only; do not rely on compensating controls as a substitute for patching.
Evidence notes
This debrief is based only on the supplied CISA KEV source item and the official links provided. The source identifies the product as Ivanti Pulse Connect Secure, classifies the issue as a command injection vulnerability, and states the required action: apply updates per vendor instructions. It also notes that ED 21-03 provides further guidance and that the due date associated with the directive is 2022-05-03. No unsupported impact, version, or exploitation details were added.
Official resources
-
CVE-2021-22899 CVE record
CVE.org
-
CVE-2021-22899 NVD detail
NVD
-
CISA Known Exploited Vulnerabilities catalog
CISA - Apply updates per vendor instructions.
-
Source item URL
cisa_kev
CVE published and modified on 2021-11-03. CISA KEV entry date: 2021-11-03. The source references an ED 21-03 due date of 2022-05-03. This summary uses only the supplied official sources and does not infer details beyond them.