Unauthenticated attackers can take control of systems by exploiting the zero days, which a suspected state-linked threat actor is chaining together. Suspected state-linked hackers have been exploiting two zero-day vulnerabilities in Ivanti Connect Secure VPN devices since early December, according to research released Wednesday by Volexity. #cyberriskmanagement #thirdpartyriskmanagement #softwaresupplychainsecurity #grc #cyberinsurance
Thomas LaFayette’s Post
More Relevant Posts
-
Software Engineer |Network Engineer | Security Resarcher | System Programer | professor | Specialized computer writer | Specialized educational consultant |
Recent SSRF Flaw in Ivanti VPN Products Undergoes Mass Exploitation Feb 06, 2024NewsroomCybersecurity / Vulnerability A recently disclosed server-side request forgery (SSRF) vulnerability impacting Ivanti Connect Secure and Policy Secure products has come under mass exploitation. The Shadowserver Foundation said it observed exploitation attempts originating from more than 170 unique IP addresses that aim to establish a reverse shell, among others. The attacks exploit CVE-2024-21893 (CVSS score: 8.2), an SSRF flaw in the SAML component of Ivanti Connect Secure, Policy Secure, and Neurons for ZTA that allows an attacker to access otherwise restricted resources without authentication. Ivanti had previously divulged that the vulnerability had been exploited in targeted attacks aimed at a "limited number of customers," but cautioned the status quo could change post public disclosure. https://lnkd.in/dcn3sS7M
Recent SSRF Flaw in Ivanti VPN Products Undergoes Mass Exploitation
thehackernews.com
To view or add a comment, sign in
-
Volexity Catches Chinese Hackers Exploiting Ivanti VPN Zero-Days: Ivanti confirms active zero-day exploits, ships pre-patch mitigations, but says comprehensive fixes won't be available until January 22. The post Volexity Catches Chinese Hackers Exploiting Ivanti VPN Zero-Days appeared first on SecurityWeek.
Volexity Catches Chinese Hackers Exploiting Ivanti VPN Zero-Days
securityweek.com
To view or add a comment, sign in
-
CEO at MOGWAI LABS GmbH, an infosec boutique with a strong emphasis on offensive security, based in Neu-Ulm (South Germany).
Using Ivanti Connect Secure? By combining two vulnerabilities (authentication bypass and RCE), unauthenticated attackers can compromise your VPN gateway. Active exploitation is reported, please update ASAP ASAP! https://lnkd.in/dyuViAxy
Ivanti Releases Security Update for Connect Secure and Policy Secure Gateways | CISA
cisa.gov
To view or add a comment, sign in
-
The security vulnerabilities, tracked as CVE-2023-46805 (CVSS score: 8.2) and CVE-2024-21887 (CVSS score: 9.1), could be abused in tandem to achieve unauthenticated remote code execution on susceptible appliances. https://lnkd.in/g_MN3zje
Hackers Exploiting Ivanti VPN Flaws to Deploy KrustyLoader Malware
thehackernews.com
To view or add a comment, sign in
-
Ivanti has released patches to address two vulnerabilities disclosed in January: CVE-2023-46805 (an authentication bypass issue) and CVE-2024-21887 (a command injection issue). Those flaws affect Connect Secure and Policy Secure; the patches fix the vulnerabilities in some but not all affected versions of the products. Ivanti has also disclosed two new zero-day vulnerabilities, one of which is being actively exploited. #ivanti #zerodayvulnerability #patchmanagement https://lnkd.in/ehQwJPvN
More Ivanti VPN Zero-Days Fuel Attack Frenzy as Patches Finally Roll
darkreading.com
To view or add a comment, sign in
-
The security vulnerabilities, tracked as CVE-2023-46805 (CVSS score: 8.2) and CVE-2024-21887 (CVSS score: 9.1), could be abused in tandem to achieve unauthenticated remote code execution on susceptible appliances.
Hackers Exploiting Ivanti VPN Flaws to Deploy KrustyLoader Malware
thehackernews.com
To view or add a comment, sign in
-
MITRE hacked through the exploitation of Ivanti Connect Secure VPN device zero-day vulnerabilities. Xiid could not only prevented this BUT can make sure it NEVER happens again! Set up an apt today 📆 https://lnkd.in/gnqRsu8b
MITRE Hack: China-Linked Group Breached Systems in December 2023
securityweek.com
To view or add a comment, sign in
-
Ivanti Zero-Day Exploits Skyrocket Worldwide; No Patches Yet... Anyone who hasn't mitigated two zero-day security bugs in Ivanti VPNs may already be compromised by a Chinese nation-state actor. Thousands of Ivanti VPN instances have been compromised across the globe in the last five days thanks to two serious, as yet unpatched zero-day vulnerabilities disclosed last week.
Ivanti Zero-Day Exploits Skyrocket Worldwide; No Patches Yet
darkreading.com
To view or add a comment, sign in
-
A true zero trust platform, like Zscaler Private Access, removes the threat of zero day vulnerabilities that have plagued Ivanti, as well as all other legacy VPN solutions, by removing all remote access entry points. True #zerotrust means no exposed devices or IP addresses to attack, because authorization happens before an inside out connection is ever made. To learn more, we encourage you to read this blog published by the Zscaler ThreatLabz Team.
ThreatLabz Coverage Advisory: Ivanti’s VPN Vulnerabilities Exploited by Hackers, New Zero-Days Pose Critical Risk
zscaler.com
To view or add a comment, sign in
-
This is just so fascinating case, no less so that now Mandiant connects (with moderate confidence) UNC5325 that is behind Ivanti exploitation with UNC3886, which is a group that went after VMware vCenter and ESXi.
Read the latest research on Ivanti exploitation and persistence in our blog. Ivanti customers are urged to take immediate action to ensure protection if they haven't done so already. A new version of the external Integrity Checking Tool (ICT), which helps detect these persistence attempts, is now available. See Ivanti's security advisory and refer to our updated remediation and hardening guide, which includes the latest recommendations. Learn more: https://bit.ly/49Q4WPd #IncidentResponse #ThreatIntelligence #ZeroDayThreats
Cutting Edge, Part 3: Investigating Ivanti Connect Secure VPN Exploitation and Persistence Attempts | Mandiant
mandiant.com
To view or add a comment, sign in