icon

Digital safety starts here for both commercial and personal Use...

Defend Your Business Against the Latest WNY Cyber Threats We offer Safe, Secure and Affordable Solutions for your Business and Personal Networks and Devices.



WNYCyber is there to help you to choose the best service providers in Western New York... We DO NOT provide the services ourselves, as we are Internet Programmers who have to deak daily with Cyber Threats... (Ugghhh)... So we know what it's like and what it takes to protect OUR and OUR CUSTOMERS DATA... We built this Website to help steer you to those that can give you the best service at realistic and non-inflated prices. We do charge or collect any fees.

Over 13,000 Ivanti gateways vulnerable to actively exploited bugs

 

Summary:
This year, Ivanti has disclosed several vulnerabilities impacting its Connect Secure, Policy Secure, and ZTA gateways. Tracked as CVE-2024-22024, CVE-2023-46805, CVE-2024-21887, CVE-2024-21893, and CVE-2024-21888, these flaws range from high to critical in severity and pertain to a case of authentication bypass, server-side-request forgery, arbitrary command execution, and command injection. Several threat actors including nation-state actors have taken advantage of vulnerable instances susceptible to these flaws to gain access to restricted resources and deploy backdoors for persistent access. Despite patches being released by the vendor, thousands of Ivanti endpoints remain vulnerable to exploitation attacks.

Analyst Comments:
According to Akamai, activity targeting the latest flaw disclosed (CVE-2024-22024) has been initiated, peaking at 240,000 requests and 80 IP addresses attempting to send payloads on February 11, 2024. Furthermore, threat monitoring service Shadowserver which scans the internet for vulnerable endpoints, notes that more than 3,900 Ivanti instances are susceptible to CVE-2024-22024, the majority of which are located in the United States (1,262). As for the other flaws addressed this year, a Shodan scan reveals that 13,636 Ivanti servers have yet to apply patches for CVE-2024-21893, CVE-2024-21888, CVE-2023-46805, and CVE-2024-21887.

Suggested Corrections:
The development comes after CISA issued a notice mandating that organizations remove their appliances from their networks in light of the heightened exploitation attempts. For organizations that need to bring back their appliances online, it was recommended to reset these instances before applying the necessary patches released by Ivanti. Once complete, these appliances should be properly segmented and continuously monitored/scanned for possible signs of compromise.

Link(s):
https://www.bleepingcomputer.com/ne...teways-vulnerable-to-actively-exploited-bugs/