Ivanti has issued a high-severity advisory for multiple vulnerabilities affecting its Connect Secure and Policy Secure products, including an authentication bypass flaw (CVE-2024-22024) that is currently being exploited in the wild. Customers are urged to apply patches immediately to mitigate risks. #CyberSecurity #VulnerabilityManagement #Ivanti
Keypoints :
- Ivanti released an advisory on February 8, 2024, for CVE-2024-22024, an authentication bypass vulnerability.
- The vulnerability affects Ivanti Connect Secure (9.x, 22.x), Ivanti Policy Secure (9.x, 22.x), and ZTA gateways.
- Customers are advised to urgently patch to fixed versions as the vulnerability is being exploited in-the-wild.
- On January 10, 2024, Ivanti disclosed two additional vulnerabilities (CVE-2023-46805 and CVE-2024-21887) enabling unauthenticated remote code execution.
- Two more vulnerabilities (CVE-2024-21888 and CVE-2024-21893) were disclosed on January 31, 2024, affecting both Connect Secure and Policy Secure.
- CISA has mandated that US federal agencies disconnect affected products from their networks and undertake immediate threat hunting.
- Wiz customers can utilize the Wiz Threat Center to identify vulnerable instances in their environment.
MITRE Techniques :
- Authentication Bypass (CVE-2024-22024) – Exploited via the SAML component, allowing access to restricted resources without authentication.
- Remote Code Execution (CVE-2023-46805) – Enables unauthenticated remote code execution through web components.
- Command Injection (CVE-2024-21887) – Allows an authenticated administrator to execute arbitrary commands on the appliance.
- Privilege Escalation (CVE-2024-21888) – Users can gain administrator-level privileges through a flaw in the web component.
- Server-Side Request Forgery (CVE-2024-21893) – Enables access to restricted resources without authentication via the SAML component.
Indicator of Compromise :
- [domain] ivanti.com
- [file name] webshell
- [file name] backdoor
- [tool name] malware
- Check the article for all found IoCs.
Full Research: https://www.wiz.io/blog/ivanti-vulnerabilities-cve-2023-46805-cve-2024-21887-cve-2024-21888-and-cve-2024-21893