In an unprecedented move, the US government's cybersecurity agency CISA is demanding that federal agencies disconnect all instances of Ivanti Connect Secure and Ivanti Policy Secure products within 48 hours.
Within 48 hours, the agency said federal network admins must also isolate the systems from any enterprise resources to the greatest degree possible, and continue to audit privilege level access accounts.
After struggling to meet its own patch delivery timeline, Ivanti on Wednesday started rolling out fixes on a staggered schedule and disclosed two new security defects in the enterprise-facing VPN appliances.
CVE-2023-46805 - An authentication bypass vulnerability in the web component of Ivanti Connect Secure and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks.
CVSS severity score 8.2/10. Confirmed exploited as zero-day.
CVE-2024-21887 - A command injection vulnerability in web components of Ivanti Connect Secure and Ivanti Policy Secure allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.
This vulnerability can be exploited over the internet.
CVE-2024-21888 - A privilege escalation vulnerability in the web component of Ivanti Connect Secure and Ivanti Policy Secure allows a user to elevate privileges to that of an administrator.
CVSS 8.8/10. CVE-2024-21893 - A server-side request forgery vulnerability in the SAML component of Ivanti Connect Secure, Ivanti Policy Secure and Ivanti Neurons for ZTA allows an attacker to access certain restricted resources without authentication.
CVSS severity score 8.2/10. Targeted exploitation confirmed.
Volexity first spotted exploitation of these issues three weeks ago and warned that a Chinese government-backed APT hacking team had built an exploit chain to break into US organizations.
SecurityWeek sources say cybercriminal groups have pounced on the public exposures to deploy cryptomers and backdoors.
This Cyber News was published on www.securityweek.com. Publication date: Thu, 01 Feb 2024 17:13:04 +0000