{"id":23703,"date":"2024-01-13T13:11:34","date_gmt":"2024-01-13T21:11:34","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2024\/01\/13\/news-17433\/"},"modified":"2024-01-13T13:11:34","modified_gmt":"2024-01-13T21:11:34","slug":"news-17433","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2024\/01\/13\/news-17433\/","title":{"rendered":"Act now! Ivanti vulnerabilities are being actively exploited"},"content":{"rendered":"\n<p>Software vendor Ivanti has <a href=\"https:\/\/forums.ivanti.com\/s\/article\/CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">warned customers<\/a> about two actively exploited vulnerabilities in all supported versions of Ivanti Connect Secure and Ivanti Policy Secure Gateways. Successful exploitation would give an attacker the ability to run arbitrary code on Ivanti&#8217;s <a href=\"https:\/\/www.malwarebytes.com\/what-is-vpn\">Virtual Private Network (VPN)<\/a> system.<\/p>\n<p>The warning is echoed by several international security agencies like <a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2024\/01\/10\/ivanti-releases-security-update-connect-secure-and-policy-secure-gateways\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CISA<\/a> and the German <a href=\"https:\/\/www.bsi.bund.de\/SharedDocs\/Cybersicherheitswarnungen\/DE\/2024\/2024-205101-1032.pdf\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">BSI<\/a>. Both are flagging active exploitation of these two chained vulnerabilities. Ivanti Connect Secure is a widely used VPN solution that allows users to connect to their organization&#8217;s network.<\/p>\n<p>The Common Vulnerabilities and Exposures (CVE) database lists publicly disclosed computer security flaws. The CVEs mentioned in these reports are:<\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-46805\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2023-46805<\/a> (<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2020\/05\/how-cvss-works-characterizing-and-scoring-vulnerabilities\">CVSS score<\/a> 8.2 out of 10): an authentication bypass vulnerability in the web component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure, which allows a remote attacker to access restricted resources by bypassing control checks.<\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-21887\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2024-21887<\/a> (CVSS score 9.1 out of 10): A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.<\/p>\n<p>Ivanti Neurons for Secure Access is not vulnerable to these CVEs. However, the gateways being managed are independently vulnerable to them.<\/p>\n<p>After attackers have used the authentication bypass to authenticate as an administrator they are able to install webshells on the VPN system to gain persistence, allowing them to execute commands on the compromised devices.<\/p>\n<p>Active exploitation has been seen as far back as December 3, 2023. These attackers erased log files and turned logging off on the compromised system. Besides that, they had stolen configuration files, altered existing files, dropped remote files, and established a reverse tunnel allowing them unrestricted access.<\/p>\n<p>One of the dropped files contained a JavaScript that stole the credentials of users that logged in, which could also be used for lateral movement.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-mitigation\">Mitigation<\/h2>\n<p>Patches will be released on a schedule based on versions, with the first coming out in the week of January 22. The last version will come out the week of February 19.<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>\u201cWe are releasing patches based upon telemetry information available to us from current installed solutions that notify us of the version number they are running. We are releasing patches for the highest number of installs first and then continuing in declining order.\u201d<\/p>\n<\/blockquote>\n<p>Until then, customers are under advice to apply a workaround and monitor their network traffic for suspicious activity and analyze the logs on their Connect Secure device.<\/p>\n<p>The workaround requires importing a mitigation.release.20240107.1.xml file which can be obtained via the <a href=\"https:\/\/forums.ivanti.com\/s\/article\/Download-Links-Related-to-CVE-2023-46805-and-CVE-2024-21887\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">download portal<\/a> (login required). The XML file is in the zipped format, so you&#8217;ll need to unzip and then import the XML file.<\/p>\n<ul>\n<li>Navigate to <strong>Maintenance<\/strong> &gt; <strong>Import\/Export<\/strong> &gt; <strong>Import XML<\/strong><\/li>\n<li>Use the <strong>Browse<\/strong> button to point to the unzipped XML file<\/li>\n<li>Click the <strong>Import<\/strong> Button<\/li>\n<\/ul>\n<p>Import of this XML into any one node of a Cluster is enough. A FAQ and more detailed instructions can be found in the <a href=\"https:\/\/forums.ivanti.com\/s\/article\/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Ivanti advisory article<\/a>.<\/p>\n<p>It is important to note that applying the workaround or a patch, when they are made available, is not enough to undo the effects of an attack. If you see signs that your instances have been compromised you should investigate or hire a specialized investigator to find out what the attackers may have obtained and what needs to be done to regain the required safety level.<\/p>\n<p>CISA has added CVE-2023-46805 and CVE-2024-21887 to its&nbsp;<a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Known Exploited Vulnerabilities Catalog<\/a>, which requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by January 21, 2024 to protect FCEB networks against active threats.<\/p>\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\" \/>\n<p><strong>We don\u2019t just report on vulnerabilities\u2014we identify them, and prioritize action.<\/strong><\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Keep vulnerabilities in tow by using\u00a0<a href=\"https:\/\/www.malwarebytes.com\/business\/vulnerability-patch-management\">ThreatDown Vulnerability and Patch Management<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/01\/act-now-ivanti-vulnerabilities-are-being-actively-exploited\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Several international security agencies are echoing a warning by Ivanti about actively exploited vulnerabilities in its VPN solution. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[22783,14947,32,10752],"class_list":["post-23703","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-exploits-and-vulnerabilities","tag-ivanti","tag-news","tag-vulnerabilities"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23703","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23703"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23703\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23703"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23703"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23703"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}