Mass Exploitation of Ivanti’s Newest Zero-Day Vulnerability Threatens Thousands of Devices

by | Feb 6, 2024 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

A critical vulnerability in Ivanti Connect Secure and Ivanti Policy Secure servers, known as CVE-2024-21893, has triggered a wave of mass exploitation by multiple attackers, posing a significant threat to affected devices. Initially flagged by Ivanti on January 31, 2024, the flaw gained zero-day status due to limited active exploitation, impacting a small subset of customers.

Exploiting CVE-2024-21893 enables attackers to circumvent authentication measures, granting unauthorized access to restricted resources on vulnerable devices running versions 9.x and 22.x.

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

The threat monitoring service Shadowserver has reported a surge in attack activity, with 170 distinct IP addresses attempting to exploit the SSRF bug.

Notably, the exploitation volume of this vulnerability surpasses that of recent Ivanti flaws, indicating a notable shift in attackers’ strategies.

Exploitation volume for latest Ivanti flawsExploitation volume for latest Ivanti flaws (Shadowserver)

Although a proof-of-concept (PoC) exploit was released by Rapid7 researchers on February 2, 2024, attackers had already devised similar methods prior to the report’s publication.

Presently, nearly 22,500 Ivanti Connect Secure devices are exposed on the Internet, with the actual number vulnerable to CVE-2024-21893 remaining unclear. In conjunction with the disclosure of this vulnerability, Ivanti released security updates addressing two additional zero-days (CVE-2023-46805 and CVE-2024-21887) detected on January 10, 2024.




These flaws were exploited by the Chinese espionage group UTA0178/UNC5221 to install webshells and backdoors on compromised devices, prompting CISA to issue an order for federal agencies to disconnect all Ivanti Connect Secure and Policy Secure VPN appliances.

This directive extends to private organizations, underscoring the critical need for comprehensive security assessments of Ivanti deployments to mitigate potential risks.

Are u a security researcher? Or a company that writes articles or write ups about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing?

If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This