Cyber Posture

CVE-2024-10630

High

Published: 14 January 2025

Published
14 January 2025
Modified
11 July 2025
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0006 17.2th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-10630 is a high-severity Race Condition within a Thread (CWE-366) vulnerability in Ivanti Application Control. Its CVSS base score is 7.8 (High).

Operationally, ranked at the 17.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-25 (Reference Monitor) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the race condition in Ivanti Application Control Engine by requiring installation of the vendor patch to version 10.14.4.0 or later.

prevent

Mandates a tamper-proof reference monitor that reliably enforces application access control policies, preventing race condition-based bypasses of blocking functionality.

prevent

Enforces organization-defined restrictions on software usage and execution, providing layered policy enforcement to mitigate bypasses in flawed application control mechanisms.

NVD Description

A race condition in Ivanti Application Control Engine before version 10.14.4.0 allows a local authenticated attacker to bypass the application blocking functionality.

Deeper analysisAI

CVE-2024-10630 is a race condition vulnerability, classified under CWE-366, affecting Ivanti Application Control Engine in versions prior to 10.14.4.0. This flaw enables a local authenticated attacker to bypass the application's blocking functionality, undermining endpoint security controls designed to restrict unauthorized software execution. The vulnerability carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), reflecting high potential impacts on confidentiality, integrity, and availability within the local scope.

A low-privileged local authenticated user can exploit this race condition by timing operations to evade blocking mechanisms, allowing execution of restricted or malicious applications. Successful exploitation grants the attacker high-level access to system resources, potentially leading to unauthorized data access, modification, or disruption without requiring user interaction.

Ivanti has issued a security advisory detailing the vulnerability at https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Application-Control-Engine-CVE-2024-10630, which recommends upgrading to version 10.14.4.0 or later to mitigate the issue.

Details

CWE(s)

Affected Products

ivanti
application control
2023.3, 2024.1, 2024.3 · ≤ 2023.3 · ≤ 2023.3
ivanti
security controls
≤ 2024.4.1

CVEs Like This One

CVE-2024-10811Same vendor: Ivanti
CVE-2025-9872Same vendor: Ivanti
CVE-2024-13166Same vendor: Ivanti
CVE-2025-9712Same vendor: Ivanti
CVE-2024-13165Same vendor: Ivanti
CVE-2025-8310Same vendor: Ivanti
CVE-2026-5786Same vendor: Ivanti
CVE-2024-13158Same vendor: Ivanti
CVE-2025-0282Same vendor: Ivanti
CVE-2024-13159Same vendor: Ivanti

References