Article Details
Scrape Timestamp (UTC): 2024-01-31 13:41:38.953
Source: https://thehackernews.com/2024/01/alert-ivanti-discloses-2-new-zero-day.html
Original Article Text
Click to Toggle View
Alert: Ivanti Discloses 2 New Zero-Day Flaws, One Under Active Exploitation. Ivanti is alerting of two new high-severity flaws in its Connect Secure and Policy Secure products, one of which is said to have come under targeted exploitation in the wild. The list of vulnerabilities is as follows - The Utha-based software company said it found no evidence of customers being impacted by CVE-2024-21888 so far, but acknowledged "the exploitation of CVE-2024-21893 appears to be targeted." It further noted that it "expects the threat actor to change their behavior and we expect a sharp increase in exploitation once this information is public." In tandem to the public disclosure of the two new vulnerabilities, Ivanti has released fixes for Connect Secure versions 9.1R14.4, 9.1R17.2, 9.1R18.3, 22.4R2.2 and 22.5R1.1, and ZTA version 22.6R1.3. "Out of an abundance of caution, we are recommending as a best practice that customers factory reset their appliance before applying the patch to prevent the threat actor from gaining upgrade persistence in your environment," it said. "Customers should expect this process to take 3-4 hours." As temporary workarounds to address CVE-2024-21888 and CVE-2024-21893, users are recommended to import the "mitigation.release.20240126.5.xml" file. The latest development comes as two other flaws in the same product – CVE-2023-46805 and CVE-2024-21887 – have come under broad exploitation by multiple threat actors to deploy backdoors, cryptocurrency miners, and a Rust-based loader called KrustyLoader. Webinar: Decoding the 2024 Customer Data Platform Report Explore the trends, challenges, and opportunities shaping the future of customer data management.
Daily Brief Summary
Ivanti has disclosed two high-severity zero-day vulnerabilities in its Connect Secure and Policy Secure products.
One vulnerability, CVE-2024-21893, is currently being exploited by attackers targeting specific entities.
Although no impacts have been reported for CVE-2024-21888, Ivanti warns of an expected uptick in exploitation attempts post-disclosure.
Patches have been released for various product versions; Ivanti suggests a factory reset before applying the patch for increased security.
Mitigation steps include importing a specific XML file as a stopgap measure until patches can be applied.
These disclosures follow the exploitation of other Ivanti product flaws, leading to unauthorized deployments of backdoors and malware.