AI
AI

Ivanti Vulnerabilities Linked Together in Attack Campaigns

Photo credit: www.darkreading.com

Ivanti Vulnerabilities Exploited in Recent Cyberattacks

Recent cyberattacks have targeted multiple vulnerabilities in Ivanti’s Cloud Service Appliance (CSA), raising concerns among organizations that utilize this software.

The Cybersecurity and Infrastructure Security Agency (CISA) and the FBI have identified key vulnerabilities that cybercriminals are exploiting. These include CVE-2024-8963, an admin bypass vulnerability; CVE-2024-9379, which pertains to SQL injection; and both CVE-2024-8190 and CVE-2024-9380, categorized as remote code execution (RCE) vulnerabilities.

Using insights from various incident-response sources, CISA discovered that attackers are leveraging these vulnerabilities in combination to gain initial access. This access facilitates RCE, credential harvesting, and the installation of web shells on compromised networks.

CISA noted, “All four vulnerabilities affect Ivanti CSA versions 4.6x prior to 519, with CVE-2024-9379 and CVE-2024-9380 also impacting CSA versions 5.0.1 and lower. Ivanti has indicated that these vulnerabilities remain unexploited in version 5.0,” CISA stated in their advisory.

To defend against these threats, CISA and the FBI advise network administrators to update to the most current supported version of Ivanti CSA. They also recommend employing available detection tools and monitoring the indicators of compromise (IoCs) shared in CISA’s advisory to help identify any malicious activities within their networks.

Related: The Security Risk of Rampant Shadow AI

In cases of detected compromise, organizations should quarantine or disconnect potentially affected systems and consider reimaging them. Additionally, it is crucial for administrators to generate new account credentials, collect and assess relevant digital evidence, and report incidents to CISA. Organizations are also encouraged to review and bolster their security measures based on the risks posed by threat actors as outlined in the MITRE ATT&CK for Enterprise framework.

Source
www.darkreading.com

Related by category

Navigating the CISO Cloud Security Dilemma: Purchase, Build, or a Combination of Both?

Photo credit: www.csoonline.com Cloud security is not solely focused on...

Cyberkriminelle optimieren ihre Angriffsstrategien.

Photo credit: www.csoonline.com Cyberkriminalität zielt zunehmend auf kleine und mittelständische...

CNAPP-Kaufberatung

Photo credit: www.csoonline.com Cloud-Sicherheit bleibt ein anspruchsvolles Thema, vor allem,...

Latest news

NASCAR to Modify Backstretch Wall at Talladega Following Significant Crash

Photo credit: www.motorsport.com NASCAR Takes Action After Crashes at Talladega Following...

How to View Star Wars: Tales of the Underworld in Fortnite

Photo credit: dotesports.com Fortnite is gearing up to offer an...

Ajith Kumar’s Wife Breaks Her Silence with First Post Following Actor’s Hospitalization Reports

Photo credit: www.news18.com Last Updated: April 30, 2025, 21:47 IST Tamil...

Breaking news