Hackers Exploit Ivanti Vulnerability to Deploy DSLog Backdoor

by | Feb 13, 2024 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

In a recent development, hackers are capitalizing on a server-side request forgery (SSRF) vulnerability present in Ivanti Connect Secure, Policy Secure, and ZTA gateways to deploy a newly identified backdoor named DSLog on susceptible devices.

The vulnerability, identified as CVE-2024-21893, was disclosed as an actively exploited zero-day on January 31, 2024. Ivanti responded by sharing security updates and mitigation guidance to address the flaw, which impacts the SAML component of the affected products.

Successful exploitation of CVE-2024-21893 enables attackers to circumvent authentication measures and gain unauthorized access to restricted resources on Ivanti gateways running versions 9.x and 22.x. To remedy the issue, Ivanti has released updates for Connect Secure versions 9.1R14.4, 9.1R17.2, 9.1R18.3, 22.4R2.2, 22.5R1.1, and 22.5R2.2, Policy Secure version 22.5R1.1, and ZTA version 22.6R1.3.

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

On February 5, 2024, threat monitoring service Shadowserver observed multiple attackers attempting to exploit the vulnerability, some utilizing proof-of-concept (PoC) exploits previously published by Rapid7. However, the success rate of these attacks remains undetermined.

Further investigation by Orange Cyberdefense confirmed the exploitation of CVE-2024-21893 to install the DSLog backdoor, allowing threat actors to execute remote commands on compromised Ivanti servers. Orange researchers discovered the presence of DSLog on a compromised appliance on February 3, 2024, after analyzing a device that had implemented Ivanti’s XML mitigation but had not applied the patch.

The DSLog backdoor operates by injecting encoded commands into SAML authentication requests, enabling attackers to execute operations such as system information retrieval and filesystem permissions manipulation. Notably, the backdoor employs a unique SHA256 hash per appliance as an API key, ensuring authentication of commands sent via HTTP requests.

Backdoor injection into the DSLog fileBackdoor injection into the DSLog file (Orange)




Despite efforts to conceal their activities, Orange identified nearly 700 compromised Ivanti servers. While some endpoints were affected by previous campaigns, others fell victim due to incomplete patches or mitigations.

Timeline of Orange's discoveriesTimeline of DSLog’s backdoor discovery (Orange)

In light of these developments, it is imperative for Ivanti users to heed the latest recommendations provided by the vendor to mitigate threats posed by vulnerabilities like SSRF and others affecting Ivanti devices.

Are u a security researcher? Or a company that writes articles or write ups about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing?

If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This