* . *
  • About
  • Advertise
  • Privacy & Policy
  • Contact
Monday, September 15, 2025
Earth-News
  • Home
  • Business
  • Entertainment

    From Spinal Tap II to Ed Sheeran : your complete entertainment guide to the week ahead – The Guardian

    Fall’s Hottest Ski Films Are Going on Tour—Here’s the List – yahoo.com

    Experience the Thrill: Fall’s Hottest Ski Films Hit the Road-Don’t Miss the Tour!

    Ryan Reynolds reveals he called a journalist who said mean things about John Candy – yahoo.com

    Ryan Reynolds Reveals the Moment He Stood Up to a Journalist Who Insulted John Candy

    Entertainment Community Fund Launches Program Supporting Entrepreneurs – Playbill

    Entertainment Community Fund Unveils Exciting New Program to Empower Entrepreneurs

    Behind the turntables: DJ Johnny Kage’s story of perseverance – yahoo.com

    Behind the Turntables: DJ Johnny Kage’s Inspiring Journey of Perseverance

    The other WWE star James Gunn wanted for Peacemaker instead of John Cena – yahoo.com

    The WWE Star James Gunn Originally Wanted for Peacemaker Instead of John Cena

  • General
  • Health
  • News

    Cracking the Code: Why China’s Economic Challenges Aren’t Shaking Markets, Unlike America’s” – Bloomberg

    Trump’s Narrow Window to Spread the Truth About Harris

    Trump’s Narrow Window to Spread the Truth About Harris

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Trending Tags

    • Trump Inauguration
    • United Stated
    • White House
    • Market Stories
    • Election Results
  • Science
  • Sports
  • Technology

    Unlocking AI Success: How People, Process, and Technology Form the Ultimate Triangle

    Billion-dollar coffins? New technology could make oceans transparent and Aukus submarines vulnerable – The Guardian

    Billion-Dollar Coffins? How New Technology Could Make Oceans Transparent and Expose Submarines

    What if artificial intelligence is just a “normal” technology? – The Economist

    What if artificial intelligence is just a “normal” technology? – The Economist

    Lincoln Trail College Receives $100,000 Grant from Marathon Petroleum Corporation for Technology Center – wwbl.com

    Lincoln Trail College Lands $100,000 Grant from Marathon Petroleum to Elevate Technology Center

    Aston Martin to integrate Pirelli’s cyber tyre technology in future models – Just Auto

    Aston Martin to Revolutionize Future Models with Pirelli’s Cutting-Edge Cyber Tyre Technology

    Figure Technology’s stock sizzles after IPO, as investors stay hungry for crypto deals – MarketWatch

    Figure Technology’s Stock Skyrockets After IPO Amid Surging Crypto Investor Excitement

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
No Result
View All Result
  • Home
  • Business
  • Entertainment

    From Spinal Tap II to Ed Sheeran : your complete entertainment guide to the week ahead – The Guardian

    Fall’s Hottest Ski Films Are Going on Tour—Here’s the List – yahoo.com

    Experience the Thrill: Fall’s Hottest Ski Films Hit the Road-Don’t Miss the Tour!

    Ryan Reynolds reveals he called a journalist who said mean things about John Candy – yahoo.com

    Ryan Reynolds Reveals the Moment He Stood Up to a Journalist Who Insulted John Candy

    Entertainment Community Fund Launches Program Supporting Entrepreneurs – Playbill

    Entertainment Community Fund Unveils Exciting New Program to Empower Entrepreneurs

    Behind the turntables: DJ Johnny Kage’s story of perseverance – yahoo.com

    Behind the Turntables: DJ Johnny Kage’s Inspiring Journey of Perseverance

    The other WWE star James Gunn wanted for Peacemaker instead of John Cena – yahoo.com

    The WWE Star James Gunn Originally Wanted for Peacemaker Instead of John Cena

  • General
  • Health
  • News

    Cracking the Code: Why China’s Economic Challenges Aren’t Shaking Markets, Unlike America’s” – Bloomberg

    Trump’s Narrow Window to Spread the Truth About Harris

    Trump’s Narrow Window to Spread the Truth About Harris

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Trending Tags

    • Trump Inauguration
    • United Stated
    • White House
    • Market Stories
    • Election Results
  • Science
  • Sports
  • Technology

    Unlocking AI Success: How People, Process, and Technology Form the Ultimate Triangle

    Billion-dollar coffins? New technology could make oceans transparent and Aukus submarines vulnerable – The Guardian

    Billion-Dollar Coffins? How New Technology Could Make Oceans Transparent and Expose Submarines

    What if artificial intelligence is just a “normal” technology? – The Economist

    What if artificial intelligence is just a “normal” technology? – The Economist

    Lincoln Trail College Receives $100,000 Grant from Marathon Petroleum Corporation for Technology Center – wwbl.com

    Lincoln Trail College Lands $100,000 Grant from Marathon Petroleum to Elevate Technology Center

    Aston Martin to integrate Pirelli’s cyber tyre technology in future models – Just Auto

    Aston Martin to Revolutionize Future Models with Pirelli’s Cutting-Edge Cyber Tyre Technology

    Figure Technology’s stock sizzles after IPO, as investors stay hungry for crypto deals – MarketWatch

    Figure Technology’s Stock Skyrockets After IPO Amid Surging Crypto Investor Excitement

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
No Result
View All Result
Earth-News
No Result
View All Result
Home Technology

Ivanti vulnerabilities explained: Everything you need to know

March 2, 2024
in Technology
Ivanti vulnerabilities explained: Everything you need to know
Share on FacebookShare on Twitter

At the end of 2023 and into 2024, a series of vulnerabilities in Ivanti Policy Secure network access control (NAC), Ivanti Connect Secure secure socket layer virtual private network (SSL VPN), and Ivanti Neurons for zero-trust access (ZTA) products caused concern at organisations worldwide after being exploited by a threat actor suspected of having links to nation-state espionage activity.

In this explainer, we explore some of the key issues arising from the Ivanti disclosures, looking at the vulnerabilities and their impact, how Ivanti has responded, what affected users should do next, and whether it is safe to continue to use Ivanti’s products.

What does Ivanti do?

Utah-headquartered Ivanti specialises in security software, IT service and asset management software, identity management software and supply chain management software.

Its history dates back to 1985 and the foundation of a company called LAN Systems. Over the past four decades, the organisation has grown via a series of mergers and acquisitions, but the Ivanti name only came into being in 2017 through the joining of two firms, LAN Systems successor LANDESK and HEAT Software, under the oversight of private equity house Clearlake Capital.

Since 2017, Ivanti has grown steadily, and now has thousands of employees in 23 countries around the world. It acquired heavily during the Covid-19 pandemic, snapping up names such as MobileIron, Pulse Secure, Cherwell Software and RiskSense.

Ivanti trades on the concept of elevating and securing “everywhere work”, enabling customer employees to use their devices to access IT applications and data however and wherever they need. It has also become a frequent and vocal commentator on security issues, and its experts are frequently quoted in IT and cyber security media.

What are the Ivanti vulnerabilities?

The issues only affect Ivanti Connect Secure (ICS), Ivanti Policy Secure (IPS) and ZTA gateways and are not present in any other Ivanti products.

The first two vulnerabilities are CVE-2023-46805 and CVE-2024-21887. The first is an authentication bypass flaw in the web component of ICS 9.2, 22.x and Policy Secure, that lets a remote attacker access restricted resources by bypassing control checks. The second is a command injection vulnerability in the web components of the same products that lets an authenticated admin send specially-crafted requests and execute arbitrary commands.

These two issues were first officially disclosed on 10 January 2024, having been discovered a month earlier by researchers at Volexity, who spotted suspicious lateral movement on a customer network and were able to identify active exploitation. Volexity determined that the threat actor was using them to implant web shells, including Glasstoken and Giftedvisitor, on internal and external-facing web servers, that they then used to execute commands on compromised devices.

This would have been a big issue on its own, but matters then developed in a worrying direction. Following the initial mitigation guidance from Ivanti, threat actors quickly found a way to get around them to deploy three more web shell variants, Bushwalk, Lightwire and Chainline.

This led to the disclosure of three new vulnerabilities. These were:

CVE-2024-21893, a server-side request forgery zero-day vulnerability in the security assertion markup language (SAML) components of ICS, IPS and ZTA that lets attackers access restricted resources without authentication;
CVE-2024-22024, an extensible markup language (XML) vulnerability in the products’ SAML component that has the same effect as CVE-2024-21893;
And CVE-2024-21888, a privilege escalation vulnerability in the web component of ICS and IPS, that lets attackers gain admin rights.

Why is Ivanti being targeted?

SSL VPN products such as ICS have been historically targeted by a wide range of threat actors, both financially-motivated cyber criminals and nation-state aligned groups, over the past few years – with a five-year-old bug, CVE-2019-11510 in ICS still exploited even today.

Why so? The answer is a relatively simple one: SSL VPNs provide an exceptionally valuable doorway into target organisations, acting as a staging point to access enterprise resources.

Their extensive use by remote workers, who are particularly vulnerable to being exploited by social engineering attacks and other forms of phishing, particularly following the Covid-19 pandemic, makes them a soft target.

As such, addressing vulnerabilities in SSL VPNs and related access products should be an easy prioritisation decision for security teams.

How has Ivanti responded to the vulnerabilities?

In a newly updated FAQ posted to its website on 14 February 2024, Ivanti thanked its customers for their “support and patience” as it navigated the recent issues. It acknowledged that the period has been testing for its customers, and reassured them that it has been working round the clock, with assistance from outside expertise, to resolve the issues.

“From day one, we have been committed to taking a customer-first approach. We have prioritised releases of mitigation and patches as quickly as possible, while also continuing to strengthen our proactive measures to combat the increasingly sophisticated and aggressive threat environment our industry is facing,” the organisation said.

“As we work to support our customers, we have strived to put continuous and direct communications at the forefront. We have also spent a great deal of time listening and incorporating feedback we have heard to continually improve our communications.”

As of mid-February, Ivanti had a secure build available for all supported versions of the affected products.

The FAQ went on to address some misinformation that had arisen following the misinterpretation of a directive from the US Cybersecurity and Infrastructure Security Agency (CISA), which many wrongly thought was instructing federal agencies of the American government to throw out and replace affected products. This was never the case, it was merely telling them to disconnect their products, and CISA has since corrected and updated its guidance.

Ivanti also denied allegations that the Connect Secure product was vulnerable due to old Linux code, although it has been helping customers move off unsupported older versions over the past 18 months.

It went on to add that it had no indication that one of the second set of vulnerabilities – CVE-2024-22024 – had been exploited in the wild, saying some confusion may have arisen in this regard because it is found in the same section of code CVE-2024-21893.

It further confirmed that the vulnerabilities disclosed on 10 January were exploited on a limited basis by threat actors, and that this had sharply increased.

It additionally stressed that while it does use its own tools and technology in-house, it had no indication that it has been compromised as a company, an indication that customer data it holds remains safe.

What should I do to address the Ivanti vulnerabilities?

Ivanti’s full guidance on how to begin to address the vulnerabilities can be found here. The guidance provided below is derived from CISA’s 9 February recent advisory, which officially relates only to federal government agencies in the US.

As of 9 February, affected organisations were being told first disconnect all instances of Ivanti Connect Secure and Ivanti Policy Secure, isolate them from any other enterprise resources as much as possible, and conduct threat hunting on any systems connected to it. Security teams should also monitor any potentially exposed authentication or identity services and audit accounts with privileged access.

To bring the affected products back into services organisations at first were advised to do the following:

Export your configuration settings;
Factory reset the product, per Ivanti’s instructions – although it this was already done before applying the patches released on 31 January and 1 February, you will not need to do this;
Rebuild the product – the instructions on how to do this can be found at the above link – and upgrade to a supported software version through Ivanti, which is free of charge;
Reimport your configuration;
If you applied any mitigation XML files, you should review the Ivanti portal for instructions on how to remove these post-upgrade;
Revoke and reissue connected or exposed certificates, keys and passwords – this includes resetting admin enable passwords, resetting stored application programming interface (API) keys, and resetting any passwords belonging to local users defined on the gateway. This last step should include service accounts used for auth server configuration;
Having returned the affected products to service, keep on top of future updates that may readdress the vulnerabilities.

CISA also advised that organisations running affected Ivanti products should assume domain accounts associated with them have been compromised, so recommended passwords twice for on-premise accounts, revoke any Kerberos tickets, and revoke other tokens for cloud accounts if your organisation is running a hybrid deployment.

However, the story has now developed significantly further. On 29 February, a new advisory from the US authorities detailed how threat actors may be able to deceive Ivanti’s internal and external Integrity Checker Tool (ICT), resulting in a failure to detect compromise via CVE-2023-46805, CVE-2024-21887, CVE-2024-22024, and CVE-2024-21893.

CISA said that it had identified this issue during multiple incident response engagements over the past weeks, and lab-based testing has validated its concerns that a threat actor may be able to gain root-level persistence after a factory reset has been performed.

This is a major concern, and CISA is now advising security teams to assume that user and service account credentials stored within affected appliances are likely compromised, to hunt for malicious activity on their networks using the methods and IoCs in the updated advisory, and to apply patching guidance provided by Ivanti as version updates roll out.

Should compromise or potential compromise be detected, security teams should collect and analyse logs and artefacts for malicious activity, and apply the incident response recommendations within the advisory.

Should I be worried about, or stop using, Ivanti?

In response to the 29 February updates, Ivanti has stated that the persistence technique identified has not yet been observed in the wild. However, it has released a new enhancement to the external Integrity Checker Tool (ICT), providing additional visibility into customer appliances and all files present on the system. More information on this can be found here.

Given this situation, we cannot and do not state with confidence that the affected Ivanti products are safe to use. This is a decision that security teams should be prepared to have to make having followed all the current guidance.

Customers can certainly expect to see exploit attempts against them, now and in the future, which makes taking action even more important.

It is important to note that although Ivanti has committed to supporting its customers and communicating additional information to assist in incident response and investigation should a customer find evidence they have been compromised, it is not itself a provide of forensic cyber services and cannot fully investigate the issue on a customer’s behalf. Compromised customers should seek guidance and support from a forensic provider.

>>> Read full article>>>
Copyright for syndicated content belongs to the linked Source : Computer Weekly – https://www.computerweekly.com/feature/Ivanti-vulnerabilities-explained-Everything-you-need-to-know

Tags: Ivantitechnologyvulnerabilities
Previous Post

Google Cloud puts AI at centre of data analytics plans

Next Post

Did Nayanthara Unfollow Husband Vignesh Shivan On Instagram? Fans Wonder If There’s ‘Technical Glitch’

Underdogs Czechia take out Serbia in straight sets at Men’s Volleyball World Championship – Volleyball World

Underdogs Czechia take out Serbia in straight sets at Men’s Volleyball World Championship – Volleyball World

September 15, 2025
The Market Isn’t Lagging – It’s Distorted: Why Investors Must Stop Treating the S&P as the Economy’s Crystal Ball – MSN

The Market Isn’t Lagging – It’s Distorted: Why Investors Must Stop Treating the S&P as the Economy’s Crystal Ball – MSN

September 15, 2025

From Spinal Tap II to Ed Sheeran : your complete entertainment guide to the week ahead – The Guardian

September 15, 2025
A multibillion-dollar oil project is impacting locals’ health and livelihood in Uganda – NPR

Multibillion-Dollar Oil Project Threatens Health and Livelihoods of Ugandan Communities

September 15, 2025
Politics chat: Assassination of Charlie Kirk and the rise of political violence – NPR

The Alarming Rise in Political Violence and the Threat Facing Charlie Kirk

September 15, 2025
Washington takes on flawed federal climate report – NewsRadio 560 KPQ

Washington Challenges Key Flaws in Federal Climate Report

September 14, 2025
James Webb telescope’s ‘starlit mountaintop’ could be the observatory’s best image yet — Space photo of the week – Live Science

James Webb Telescope Unveils Stunning ‘Starlit Mountaintop’ – Perhaps Its Most Breathtaking Image Yet

September 14, 2025

Colby College Announces Exciting New $150 Million Science Facility Funded by Anonymous Donor

September 14, 2025
Maine Coon Cat’s Sweet Love Story With Tiny Sphynx Kitty Is Touching Hearts – yahoo.com

Adorable Maine Coon and Tiny Sphynx Share a Heartwarming Love Story

September 14, 2025

Unlocking AI Success: How People, Process, and Technology Form the Ultimate Triangle

September 14, 2025

Categories

Archives

September 2025
MTWTFSS
1234567
891011121314
15161718192021
22232425262728
2930 
« Aug    
Earth-News.info

The Earth News is an independent English-language daily published Website from all around the World News

Browse by Category

  • Business (20,132)
  • Ecology (820)
  • Economy (840)
  • Entertainment (21,718)
  • General (17,042)
  • Health (9,884)
  • Lifestyle (855)
  • News (22,149)
  • People (843)
  • Politics (849)
  • Science (16,050)
  • Sports (21,340)
  • Technology (15,822)
  • World (823)

Recent News

Underdogs Czechia take out Serbia in straight sets at Men’s Volleyball World Championship – Volleyball World

Underdogs Czechia take out Serbia in straight sets at Men’s Volleyball World Championship – Volleyball World

September 15, 2025
The Market Isn’t Lagging – It’s Distorted: Why Investors Must Stop Treating the S&P as the Economy’s Crystal Ball – MSN

The Market Isn’t Lagging – It’s Distorted: Why Investors Must Stop Treating the S&P as the Economy’s Crystal Ball – MSN

September 15, 2025
  • About
  • Advertise
  • Privacy & Policy
  • Contact

© 2023 earth-news.info

No Result
View All Result

© 2023 earth-news.info

No Result
View All Result

© 2023 earth-news.info

Go to mobile version