Skip to content

Ivanti Multiple Vulnerabilities Added in CISA Known Exploits List - 20240111001

Overview

CISA and their partners released joint Cybersecurity Advisory Threat Actors Exploit Multiple Vulnerabilities in Ivanti Connect Secure and Policy Secure Gateways

Threat actors can exploit in a chain to bypass authentication, craft malicious requests, and execute arbitrary commands with elevated privileges.

What is vulnerable?

The following vulnerabilities impact all supported versions of Ivanti Connect Secure and Ivanti Policy Secure gateways.

CVE Severity CVSS Summary Exploitation Dated
CVE-2023-46805 High 8.2 An authentication bypass vulnerability in the web component allows a remote attacker to access restricted resources by bypassing control checks. Yes 1 Feb, 2024
CVE-2024-21887 Critical 9.1 A command injection vulnerability in web components allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance. This vulnerability can be exploited over the internet. Yes 1 Feb, 2024
CVE-2024-21893 High 8.2 A server-side request forgery vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) and Ivanti Neurons for ZTA allows an attacker to access certain restricted resources without authentication. Yes 1 Feb, 2024

What has been observed?

Ivanti have seen evidence of threat actors attempting to manipulate Ivanti’s internal integrity checker (ICT). CISA has added the above CVEs to their Known Exploited Vulnerabilities Catalog.

Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of 48 Hours... (refer Patch Management):