CVE-2024-8963, CVE-2024-9379, CVE-2024-8190, and CVE-2024-9380 Detection: CISA and FBI Warn Defenders of Two Exploit Chains Using Critical Ivanti CSA Vulnerabilities – SOC Prime

CVE-2024-8963, CVE-2024-9379, CVE-2024-8190, and CVE-2024-9380 Detection: CISA and FBI Warn Defenders of Two Exploit Chains Using Critical Ivanti CSA Vulnerabilities – SOC Prime
Recent vulnerabilities in Ivanti Cloud Service Appliances (CSA) pose significant risks, allowing adversaries to exploit them through various chains. The CISA and FBI alert highlights the need for immediate action, as attackers have been able to gain access, execute remote code, and compromise sensitive networks. Affected: Ivanti Cloud Service Appliances, Enterprise Security

Keypoints :

  • Ivanti Cloud Service Appliances (CSAs) face critical vulnerabilities tracked as CVE-2024-8963, CVE-2024-9379, CVE-2024-8190, and CVE-2024-9380.
  • These vulnerabilities are actively being exploited, leading to unauthorized access and deployment of malware.
  • CISA and FBI issued a joint alert emphasizing the urgency for cyber defenders to address these threats.
  • Exploit chains combine these vulnerabilities, enabling initial access, remote code execution, and credential theft.
  • Organizations are advised to upgrade to the latest supported CSA version to mitigate risks.

MITRE Techniques :

  • TA0001 – Initial Access: Adversaries exploited CVE-2024-8963 to gain initial access to the network.
  • TA0002 – Execution: Utilized CVE-2024-8190 and CVE-2024-9380 to execute commands with elevated privileges.
  • TA0009 – Credential Access: Employed techniques to steal encrypted admin credentials using base64-encoded Python scripts.
  • TA0003 – Persistence: Implemented webshells for maintaining access to the compromised systems.
  • TA0004 – Command and Control: Created a reverse TCP channel for command and control using implanted webshells.

CVE :

  • [CVE] CVE-2024-8963
  • [CVE] CVE-2024-9379
  • [CVE] CVE-2024-8190
  • [CVE] CVE-2024-9380

Full Story: https://socprime.com/blog/detect-exploit-chains-leveraging-critical-ivanti-csa-vulnerabilities/