Cyber security news for all

More

    Ivanti Unveils 2 Fresh Zero-Day Vulnerabilities, One Exploited in the Wild

    Ivanti has issued an alert regarding two new significant vulnerabilities discovered in its Connect Secure and Policy Secure products, with one already being actively exploited in live environments.

    Vulnerability Details:

    CVE-2024-21888 (CVSS score: 8.8) – Privilege Escalation Flaw

    This flaw affects the web component of Ivanti Connect Secure (versions 9.x, 22.x) and Ivanti Policy Secure (versions 9.x, 22.x), enabling a user to elevate their privileges to administrator level.

    CVE-2024-21893 (CVSS score: 8.2) – Server-Side Request Forgery (SSRF) Vulnerability

    Found in the SAML component of Ivanti Connect Secure (versions 9.x, 22.x), Ivanti Policy Secure (versions 9.x, 22.x), and Ivanti Neurons for ZTA, this vulnerability allows attackers to access restricted resources without authentication.

    Impact Assessment:

    While no evidence of CVE-2024-21888 affecting customers has been found, Ivanti acknowledges targeted exploitation of CVE-2024-21893, impacting a limited number of users. Ivanti anticipates an escalation in exploitation once this information becomes public.

    Mitigation Steps:

    In response, Ivanti has promptly released patches for affected versions: Connect Secure (9.1R14.4, 9.1R17.2, 9.1R18.3, 22.4R2.2, 22.5R1.1), and ZTA (22.6R1.3). As a precaution, customers are advised to factory reset their appliances before applying patches to prevent threat actors from establishing upgrade persistence, with an estimated duration of 3-4 hours.

    Temporary Workarounds:

    To address CVE-2024-21888 and CVE-2024-21893 temporarily, users can implement the “mitigation.release.20240126.5.xml” file.

    Ongoing Developments:

    This announcement follows the exploitation of two previous flaws (CVE-2023-46805 and CVE-2024-21887) by multiple threat actors to execute various malicious activities. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a recent advisory highlighting these exploits, emphasizing the importance of proactive measures to prevent credential theft and network compromise.

    Threat actors have demonstrated sophistication by circumventing existing mitigations and detection methods, exploiting weaknesses, lateral movement, and privilege escalation undetected. Notably, the external integrity checker tool (ICT) has been compromised, further complicating detection efforts.

    Recent Articles

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox

    [tdn_block_newsletter_subscribe input_placeholder="Email address" btn_text="Subscribe" tds_newsletter2-image="730" tds_newsletter2-image_bg_color="#c3ecff" tds_newsletter3-input_bar_display="" tds_newsletter4-image="731" tds_newsletter4-image_bg_color="#fffbcf" tds_newsletter4-btn_bg_color="#f3b700" tds_newsletter4-check_accent="#f3b700" tds_newsletter5-tdicon="tdc-font-fa tdc-font-fa-envelope-o" tds_newsletter5-btn_bg_color="#000000" tds_newsletter5-btn_bg_color_hover="#4db2ec" tds_newsletter5-check_accent="#000000" tds_newsletter6-input_bar_display="row" tds_newsletter6-btn_bg_color="#da1414" tds_newsletter6-check_accent="#da1414" tds_newsletter7-image="732" tds_newsletter7-btn_bg_color="#1c69ad" tds_newsletter7-check_accent="#1c69ad" tds_newsletter7-f_title_font_size="20" tds_newsletter7-f_title_font_line_height="28px" tds_newsletter8-input_bar_display="row" tds_newsletter8-btn_bg_color="#00649e" tds_newsletter8-btn_bg_color_hover="#21709e" tds_newsletter8-check_accent="#00649e" embedded_form_code="YWN0aW9uJTNEJTIybGlzdC1tYW5hZ2UuY29tJTJGc3Vic2NyaWJlJTIy" tds_newsletter="tds_newsletter1" tds_newsletter3-all_border_width="2" tds_newsletter3-all_border_color="#e6e6e6" tdc_css="eyJhbGwiOnsibWFyZ2luLWJvdHRvbSI6IjAiLCJib3JkZXItY29sb3IiOiIjZTZlNmU2IiwiZGlzcGxheSI6IiJ9fQ==" tds_newsletter1-btn_bg_color="#0d42a2" tds_newsletter1-f_btn_font_family="406" tds_newsletter1-f_btn_font_transform="uppercase" tds_newsletter1-f_btn_font_weight="800" tds_newsletter1-f_btn_font_spacing="1" tds_newsletter1-f_input_font_line_height="eyJhbGwiOiIzIiwicG9ydHJhaXQiOiIyLjYiLCJsYW5kc2NhcGUiOiIyLjgifQ==" tds_newsletter1-f_input_font_family="406" tds_newsletter1-f_input_font_size="eyJhbGwiOiIxMyIsImxhbmRzY2FwZSI6IjEyIiwicG9ydHJhaXQiOiIxMSIsInBob25lIjoiMTMifQ==" tds_newsletter1-input_bg_color="#fcfcfc" tds_newsletter1-input_border_size="0" tds_newsletter1-f_btn_font_size="eyJsYW5kc2NhcGUiOiIxMiIsInBvcnRyYWl0IjoiMTEiLCJhbGwiOiIxMyJ9" content_align_horizontal="content-horiz-center"]