Ivanti customers have been urged to follow the security vendor's suggested workaround after it confirmed that two zero-day vulnerabilities in its Connect Secure and Policy Secure gateways are being actively exploited.
Connect Secure is a VPN product while Policy Secure is a network access control solution.
Security vendor Volexity yesterday claimed that a Chinese state actor tracked as UTA0178 was behind the attacks.
It said the group may have been exploiting CVE-2023-46805 and CVE-2024-21887 as far back as December 3 2023 to place webshells on victim organizations' internal and external-facing web servers.
The zero-day vulnerabilities affect all supported versions of Ivanti Connect Secure, formerly known as Pulse Connect Secure, and Ivanti Policy Secure gateways.
CVE-2023-46805 is an authentication bypass vulnerability in the web component of the two products that allows remote attackers to access restricted resources by bypassing control checks, Ivanti said in an advisory.
CVE-2024-21887 is a command injection vulnerability in the web components of the products which allows an authenticated administrator to send specially crafted requests which execute arbitrary commands on the appliance.
It can be exploited over the internet and is given a CVSS score of 9.1.
The two can be chained to potentially devastating effect.
Action1 president and co-founder, Mike Walters, claimed that a Shodan search reveals around 15,000 Ivanti devices currently exposed online.
Patches will not be available until the week of January 22, and even then Ivanti is releasing them in a staggered schedule according to product version.
In the meantime, it has released a series of mitigation steps that customers are urged to follow immediately.
Ivanti products have previously been exploited by suspected Chinese state hackers.
In July, they targeted CVE-2023-35078 and CVE-2023-35081 in the firm's Endpoint Manager Mobile product to compromise several Norwegian government agencies.
In April 2021, prior to Ivanti's acquisition of Pulse Secure, Chinese hackers exploited another critical zero-day bug in the Pulse Connect Secure product.
This Cyber News was published on www.infosecurity-magazine.com. Publication date: Thu, 11 Jan 2024 09:30:29 +0000