• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
five eyes agencies warn of active exploitation of ivanti gateway

Five Eyes Agencies Warn of Active Exploitation of Ivanti Gateway Vulnerabilities

You are here: Home / General Cyber Security News / Five Eyes Agencies Warn of Active Exploitation of Ivanti Gateway Vulnerabilities
March 1, 2024

The Five Eyes (FVEY) intelligence alliance has issued a new cybersecurity advisory warning of cyber threat actors exploiting recognised security flaws in Ivanti Hook up Secure and Ivanti Policy Safe gateways, noting that the Integrity Checker Resource (ICT) can be deceived to provide a wrong perception of security.

“Ivanti ICT is not ample to detect compromise and that a cyber danger actor may be in a position to get root-amount persistence in spite of issuing manufacturing unit resets,” the agencies explained.

To day, Ivanti has disclosed 5 security vulnerabilities impacting its goods due to the fact January 10, 2024, out of which 4 have occur below energetic exploitation by numerous menace actors to deploy malware –

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


  • CVE-2023-46805 (CVSS score: 8.2) – Authentication bypass vulnerability in web part
  • CVE-2024-21887 (CVSS rating: 9.1) – Command injection vulnerability in web component
  • CVE-2024-21888 (CVSS rating: 8.8) – Privilege escalation vulnerability in web component
  • CVE-2024-21893 (CVSS rating: 8.2) – SSRF vulnerability in the SAML element
  • CVE-2024-22024 (CVSS score: 8.3) – XXE vulnerability in the SAML component

Mandiant, in an analysis printed this 7 days, explained how an encrypted edition of malware identified as BUSHWALK is put in a listing excluded by ICT in /information/runtime/cockpit/diskAnalysis.

Cybersecurity

The directory exclusions have been also beforehand highlighted by Eclypsium this month, stating the instrument skips a dozen directories from staying scanned, consequently allowing for an attacker to leave guiding backdoors in just one of these paths and nevertheless go the integrity look at.

“The safest program of action for network defenders is to assume a refined threat actor may possibly deploy rootkit degree persistence on a product that has been reset and lay dormant for an arbitrary quantity of time,” businesses from Australia, Canada, New Zealand, the U.K., and the U.S. stated.

Ivanti Gateway Vulnerabilities

They also urged organizations to “take into consideration the major risk of adversary entry to, and persistence on, Ivanti Join Secure and Ivanti Policy Safe gateways when pinpointing regardless of whether to carry on operating these devices in an enterprise surroundings.”

Ivanti, in response to the advisory, mentioned it is not mindful of any occasions of successful threat actor persistence next the implementation of security updates and factory resets. It can be also releasing a new variation of ICT that it mentioned “provides supplemental visibility into a customer’s appliance and all documents that are current on the technique.”

Observed this report fascinating? Comply with us on Twitter  and LinkedIn to read additional unique content we article.


Some components of this report are sourced from:
thehackernews.com

Previous Post: «github rolls out default secret scanning push protection for public GitHub Rolls Out Default Secret Scanning Push Protection for Public Repositories
Next Post: New BIFROSE Linux Malware Variant Using Deceptive VMware Domain for Evasion new bifrose linux malware variant using deceptive vmware domain for»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)
  • PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution
  • Securing Data in the AI Era
  • Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
  • Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
  • CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises
  • Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
  • Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
  • Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
  • What Security Leaders Need to Know About AI Governance for SaaS

Copyright © TheCyberSecurity.News, All Rights Reserved.