Thursday, November 14, 2024
HomeCVE/vulnerabilityIvanti Warns of Critical Vulnerabilities in Connect Secure, Policy Secure & Secure...

Ivanti Warns of Critical Vulnerabilities in Connect Secure, Policy Secure & Secure Access

Published on

Malware protection

Ivanti, the well-known provider of IT asset and service management solutions, has issued critical security updates for its products Ivanti Connect Secure (ICS), Ivanti Policy Secure (IPS), and Ivanti Secure Access Client (ISAC).

These updates address multiple vulnerabilities, including medium, high, and critical severity issues, which, if exploited, could lead to denial of service (DoS), privilege escalation, and even remote code execution (RCE).

The company urges users to apply the patches immediately, though it reassures that there are currently no known cases of active exploitation of these vulnerabilities in the wild.

- Advertisement - SIEM as a Service

Summary of Vulnerabilities

Ivanti has identified and patched a wide range of vulnerabilities affecting its products, including stack-based buffer overflows, use-after-free bugs, command injections, and incorrect file permissions.

Free Ultimate Continuous Security Monitoring Guide - Download Here (PDF)

Some of the most severe vulnerabilities could allow attackers to gain administrative privileges or execute arbitrary code on affected systems.

Below is a detailed list of the vulnerabilities, along with their CVE numbers, descriptions, CVSS scores, and the affected products.


CVE Number
DescriptionCVSS Score (Severity)Impacted Product(s)
CVE-2024-38655Argument injection allowing a remote authenticated attacker with admin privileges to achieve remote code execution.9.1 (Critical)Connect Secure & Policy Secure
CVE-2024-38656Argument injection allowing a remote authenticated attacker with admin privileges to achieve RCE in older versions.9.1 (Critical)Connect Secure & Policy Secure
CVE-2024-39710Argument injection enabling RCE by remote authenticated admin attackers.9.1 (Critical)Connect Secure & Policy Secure
CVE-2024-11007Command injection allowing a remote authenticated attacker with admin privileges to execute arbitrary commands on the system.9.1 (Critical)Connect Secure & Policy Secure
CVE-2024-11006Command injection allowing RCE via remote admin attackers in vulnerable versions.9.1 (Critical)Connect Secure & Policy Secure
CVE-2024-11005Command injection allowing RCE by remote admin attackers.9.1 (Critical)Connect Secure & Policy Secure

Affected Versions and Patch Availability

Ivanti has released patches to address all identified vulnerabilities. The following table outlines the affected versions and the corresponding resolved versions:

Product NameAffected Version(s)Resolved Version(s)Patch Availability
Ivanti Connect Secure (ICS)22.7R2.2 and prior22.7R2.3Ivanti Portal
Ivanti Policy Secure (IPS)22.7R1.1 and prior22.7R1.2Ivanti Portal
Ivanti Secure Access Client (ISAC)22.7R3 and prior22.7R4Ivanti Portal

Ivanti recommends that users of the affected products immediately update their systems to the latest patched versions to mitigate the risk of exploitation.

Ivanti customers can download the patches from the Ivanti support portal. Given the critical nature of some of these vulnerabilities, particularly the risk of remote code execution, administrators need to prioritize these updates and ensure their environments are secured.

Run private, Real-time Malware Analysis in both Windows & Linux VMs. Get a 14-day free trial with ANY.RUN!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

GitLab Patches Critical Flaws Leads to Unauthorized Access to Kubernetes Cluster

GitLab has rolled out critical security updates to address multiple vulnerabilities in its Community...

Windows 0-Day Exploited in Wild with Single Right Click

A newly discovered zero-day vulnerability, CVE-2024-43451, has been actively exploited in the wild, targeting Windows...

Automating Identity and Access Management for Modern Enterprises

Keeping track of who has access and managing their permissions has gotten a lot...

Finding The Right E-Commerce Platform – Comparing Reselling Solutions

If you’re looking to make some extra cash or to start a business, you...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

GitLab Patches Critical Flaws Leads to Unauthorized Access to Kubernetes Cluster

GitLab has rolled out critical security updates to address multiple vulnerabilities in its Community...

Windows 0-Day Exploited in Wild with Single Right Click

A newly discovered zero-day vulnerability, CVE-2024-43451, has been actively exploited in the wild, targeting Windows...

Fortinet Patches Critical Flaws That Affected Multiple Products

Fortinet, a leading cybersecurity provider, has issued patches for several critical vulnerabilities impacting multiple...