Article Details
Scrape Timestamp (UTC): 2024-01-20 04:36:07.465
Source: https://thehackernews.com/2024/01/cisa-issues-emergency-directive-to.html
Original Article Text
Click to Toggle View
CISA Issues Emergency Directive to Federal Agencies on Ivanti Zero-Day Exploits. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday issued an emergency directive urging Federal Civilian Executive Branch (FCEB) agencies to implement mitigations against two actively exploited zero-day flaws in Ivanti Connect Secure (ICS) and Ivanti Policy Secure (IPS) products. The development came after the vulnerabilities – an authentication bypass (CVE-2023-46805) and a code injection bug (CVE-2024-21887) – came under widespread exploitation of vulnerabilities by multiple threat actors. The flaws allow a malicious actor to craft malicious requests and execute arbitrary commands on the system. The U.S. company acknowledged in an advisory that it has witnessed a "sharp increase in threat actor activity" starting on January 11, 2024, after the shortcomings were publicly disclosed. "Successful exploitation of the vulnerabilities in these affected products allows a malicious threat actor to move laterally, perform data exfiltration, and establish persistent system access, resulting in full compromise of target information systems," the agency said. Ivanti, which is expected to release an update to address the flaws next week, has made available a temporary workaround through an XML file that can be imported into affected products to make necessary configuration changes. CISA is urging organizations running ICS to apply the mitigation and run an External Integrity Checker Tool to identify signs of compromise, and if found, disconnect them from the networks and reset the device, followed by importing the XML file. In addition, FCEB entities are urged to revoke and reissue any stored certificates, reset the admin enable password, store API keys, and reset the passwords of any local user defined on the gateway. Cybersecurity firms Volexity and Mandiant have observed attacks weaponizing the twin flaws to deploy web shells and passive backdoors for persistent access to compromised appliances. As many as 2,100 devices worldwide are estimated to have been compromised to date. The initial attack wave identified in December 2023 has been attributed to a Chinese nation-state group that is being tracked as UTA0178. Mandiant is keeping tabs on the activity under the moniker UNC5221, although it has not been linked to any specific group or country. Threat intelligence firm GreyNoise said it has also observed the vulnerabilities being abused to drop persistent backdoors and XMRig cryptocurrency miners, indicating opportunistic exploitation by bad actors for financial gain. SaaS Security Masterclass: Insights from 493 Companies Watch this webinar to discover Critical SaaS Security Do's and Don'ts based on a study of 493 companies, offering real-world comparisons and benchmarks.
Daily Brief Summary
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency directive to Federal Civilian Executive Branch (FCEB) agencies.
Directive targets two zero-day vulnerabilities in Ivanti Connect Secure and Ivanti Policy Secure that are under active exploitation.
Threat actors can execute arbitrary commands on the system or move laterally, perform data exfiltration, establish persistent system access, and fully compromise target information systems.
Ivanti is expected to release an update next week, but temporary workarounds are available via an importable XML file for configuration changes.
Organizations using affected Ivanti products are advised to apply the mitigation, use an External Integrity Checker Tool, revoke and reissue certificates, and reset passwords.
Cybersecurity firms have observed the deployment of web shells and backdoors using the exploits, with 2,100 devices reportedly compromised.
The initial attacks in December 2023 were linked to a Chinese nation-state group, while recent activities show exploitation by various actors, including for financial gains through cryptocurrency mining.