• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
alert: ivanti discloses 2 new zero day flaws, one under active

Alert: Ivanti Discloses 2 New Zero-Day Flaws, One Under Active Exploitation

You are here: Home / General Cyber Security News / Alert: Ivanti Discloses 2 New Zero-Day Flaws, One Under Active Exploitation
January 31, 2024

Ivanti is alerting of two new substantial-severity flaws in its Connect Safe and Coverage Secure goods, a single of which is stated to have come under targeted exploitation in the wild.

The list of vulnerabilities is as follows –

  • CVE-2024-21888 (CVSS score: 8.8) – A privilege escalation vulnerability in the web element of Ivanti Connect Secure (9.x, 22.x) and Ivanti Plan Protected (9.x, 22.x) will allow a consumer to elevate privileges to that of an administrator
  • CVE-2024-21893 (CVSS rating: 8.2) – A server-facet ask for forgery vulnerability in the SAML element of Ivanti Join Safe (9.x, 22.x), Ivanti Coverage Secure (9.x, 22.x) and Ivanti Neurons for ZTA enables an attacker to entry specified restricted assets without the need of authentication

The Utah-centered application business stated it uncovered no evidence of shoppers getting impacted by CVE-2024-21888 so far, but acknowledged “the exploitation of CVE-2024-21893 seems to be qualified.”

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

It further more mentioned that it “expects the risk actor to modify their actions and we be expecting a sharp raise in exploitation once this data is community.”

In tandem to the public disclosure of the two new vulnerabilities, Ivanti has released fixes for Link Protected versions 9.1R14.4, 9.1R17.2, 9.1R18.3, 22.4R2.2 and 22.5R1.1, and ZTA model 22.6R1.3.

“Out of an abundance of caution, we are recommending as a best exercise that buyers manufacturing unit reset their appliance ahead of applying the patch to reduce the menace actor from gaining improve persistence in your natural environment,” it claimed. “Buyers should really assume this approach to take 3-4 hrs.”

As momentary workarounds to address CVE-2024-21888 and CVE-2024-21893, users are recommended to import the “mitigation.release.20240126.5.xml” file.

The most current progress comes as two other flaws in the similar products – CVE-2023-46805 and CVE-2024-21887 – have arrive beneath broad exploitation by several menace actors to deploy backdoors, cryptocurrency miners, and a Rust-based mostly loader termed KrustyLoader.

Identified this report intriguing? Stick to us on Twitter  and LinkedIn to read additional distinctive information we publish.


Some areas of this post are sourced from:
thehackernews.com

Previous Post: «telegram marketplaces fuel phishing attacks with easy to use kits and malware Telegram Marketplaces Fuel Phishing Attacks with Easy-to-Use Kits and Malware
Next Post: RunC Flaws Enable Container Escapes, Granting Attackers Host Access runc flaws enable container escapes, granting attackers host access»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
  • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
  • Beyond Vulnerability Management – Can You CVE What I CVE?
  • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
  • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
  • 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
  • SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

Copyright © TheCyberSecurity.News, All Rights Reserved.