A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.
In one analyzed incident, attackers used these vulnerabilities to gain extensive access to internal systems and networks. They modified files to log keystrokes and steal credentials, enabling them to perform actions like data theft and deploying a custom web shell for persistent access. In response, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added these vulnerabilities to its Known Exploited Vulnerabilities catalog. Federal agencies are advised to apply the fixes by January 31, 2024.
Organizations are recommended to regularly update systems, conduct security audits, and implement strong network monitoring to protect against such threats, especially for critical devices like VPN appliances and firewalls.
Affected Systems
Affected Versions
All currently supported versions 9.x and 22.x prior to mitigation by the respective
vendor are vulnerable. It is unknown whether unsupported versions 8.x and below are also
vulnerable.
Product | Affected Versions |
---|---|
Ivanti Policy Secure | All 9.x ve 22.x versions |
Ivanti Connect Secure | All 9.x ve 22.x versions |
IoC’s
-
Recommended Solution(s)
-
Mitigations
Temporary Solution
CVE-2023-46805 and CVE-2024-21887 can be mitigated by importing the mitigation.release.20240107.1.xml file via the download portal.
Ivanti is now providing mitigation while the patch is under development to prioritise the interests of its customers.
Ivanti has created a mitigation to be applied to gateways.
CVE / CWE
CVE-2024-21887
Related Website(s)
* Vulnerabilities with a CVSS 3.1 score between 7.0 and 8.9 are evaluated to be “high” whereas vulnerabilities with a CVSS 3.1 score between 9.0 and 10.0 are evaluated to be “critical”.
+90 216 504 53 32
Aydınevler Mahallesi,İsmet İnönü Cadddesi,Küçükyalı Ofis Park A Blok,No:20/1 Maltepe İstanbul
+90 312 235 44 51
You can register to our newsletter on the home page to be instantly informed about security vulnerabilities.