Article Details
Scrape Timestamp (UTC): 2024-10-08 16:41:38.043
Source: https://thehackernews.com/2024/10/zero-day-alert-three-critical-ivanti.html
Original Article Text
Click to Toggle View
Zero-Day Alert: Three Critical Ivanti CSA Vulnerabilities Actively Exploited. Ivanti has warned that three new security vulnerabilities impacting its Cloud Service Appliance (CSA) have come under active exploitation in the wild. The zero-day flaws are being weaponized in conjunction with another flaw in CSA that the company patched last month, the Utah-based software services provider said. Successful exploitation of these vulnerabilities could allow an authenticated attacker with admin privileges to bypass restrictions, run arbitrary SQL statements, or obtain remote code execution. "We are aware of a limited number of customers running CSA 4.6 patch 518 and prior who have been exploited when CVE-2024-9379, CVE-2024-9380 or CVE-2024-9381 are chained with CVE-2024-8963," the company said. There is no evidence of exploitation against customer environments running CSA 5.0. A brief description of the three shortcomings is as follows - The attacks observed by Ivanti involve combining the aforementioned flaws with CVE-2024-8963 (CVSS score: 9.4), a critical path traversal vulnerability that allows a remote unauthenticated attacker to access restricted functionality. Ivanti said it discovered the three new flaws as part of its investigation into the exploitation of CVE-2024-8963 and CVE-2024-8190 (CVSS score: 7.2), another now-patched OS command injection bug in CSA that has also been abused in the wild. The company is also recommending users to review the appliance for modified or newly added administrative users to look for signs of compromise, or checking alerts from endpoint detection and response (EDR) tools installed on the device. The development comes less than a week after the U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a security flaw impacting Ivanti Endpoint Manager (EPM) that was fixed in May (CVE-2024-29824, CVSS score: 9.6) to the Known Exploited Vulnerabilities (KEV) catalog.
Daily Brief Summary
Ivanti reported active exploitation of three new zero-day vulnerabilities in its Cloud Service Appliance (CSA).
The vulnerabilities allow attackers with admin privileges to bypass security restrictions, execute SQL commands, or perform remote code execution.
These flaws have been exploited in conjunction with a previously patched vulnerability, CVE-2024-8963, a severe path traversal issue.
Affected versions include CSA 4.6 patch 518 and prior, with no recorded exploits against environments running CSA 5.0.
Ivanti discovered the vulnerabilities during an investigation into previous exploits of CSA vulnerabilities, including another OS command injection bug, CVE-2024-8190.
Ivanti recommends users to inspect CSA for any signs of compromise, such as changes in administrative users, and advises the use of EDR tools for ongoing monitoring.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently added another related Ivanti vulnerability to its Known Exploited Vulnerabilities catalog.