• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
ivanti pulse secure found using 11 year old linux version and outdated

Ivanti Pulse Secure Found Using 11-Year-Old Linux Version and Outdated Libraries

You are here: Home / General Cyber Security News / Ivanti Pulse Secure Found Using 11-Year-Old Linux Version and Outdated Libraries
February 15, 2024

A reverse engineering of the firmware jogging on Ivanti Pulse Protected appliances has exposed quite a few weaknesses, when yet again underscoring the problem of securing computer software offer chains.

Eclypsiusm, which acquired firmware variation 9.1.18.2-24467.1 as component of the process, explained the foundation working method employed by the Utah-based mostly software business for the system is CentOS 6.4.

“Pulse Protected runs an 11-year-previous version of Linux which has not been supported since November 2020,” the firmware security organization said in a report shared with The Hacker News.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The advancement will come as danger actors are capitalizing on a amount of security flaws identified in Ivanti Link Secure, Plan Protected, and ZTA gateways to deliver a huge assortment of malware, which include web shells, stealers, and backdoors.

The vulnerabilities that have appear underneath energetic exploitation in latest months comprise CVE-2023-46805, CVE-2024-21887, and CVE-2024-21893. Past week, Ivanti also disclosed an additional bug in the program (CVE-2024-22024) that could allow risk actors to accessibility usually restricted resources devoid of any authentication.

Cybersecurity

In an alert posted yesterday, web infrastructure enterprise Akamai mentioned it has observed “substantial scanning action” concentrating on CVE-2024-22024 commencing February 9, 2024, pursuing the publication of a proof-of-idea (PoC) by watchTowr.

Eclypsium mentioned it leveraged a PoC exploit for CVE-2024-21893 that was launched by Speedy7 previously this thirty day period to obtain a reverse shell to the PSA3000 equipment, subsequently exporting the product impression for adhere to-on analysis utilizing the EMBA firmware security analyzer.

This not only uncovered a quantity of out-of-date offers – corroborating past results from security researcher Will Dormann – but also a number of vulnerable libraries that are cumulatively prone to 973 flaws, out of which 111 have publicly known exploits.

Quantity of scanning requests for each day concentrating on CVE-2024-22024

Perl, for occasion, has not been updated considering that variation 5.6.1, which was introduced 23 a long time ago on April 9, 2001. The Linux kernel variation is 2.6.32, which achieved conclusion-of-lifestyle (EoL) as of March 2016.

“These outdated computer software deals are elements in the Ivanti Hook up Secure products,” Eclypsium said. “This is a perfect instance as to why visibility into electronic source chains is crucial and why company buyers are ever more demanding SBOMs from their sellers.”

Also, a deeper examination of the firmware unearthed 1,216 issues in 76 shell scripts, 5,218 vulnerabilities in 5,392 Python files, in addition to 133 outdated certificates.

The issues do not close there, for Eclypsium observed a “security hole” in the logic of the Integrity Checker Device (ICT) that Ivanti has advisable its customers to use in get to seem for indicators of compromise (IoCs).

Specifically, the script has been identified to exclude in excess of a dozen directories these types of as /information, /etc, /tmp, and /var from currently being scanned, thereby hypothetically allowing for an attacker to deploy their persistent implants in 1 of these paths and still pass the integrity check. The device, on the other hand, scans the /dwelling partition that shops all item-particular daemons and configuration data files.

Cybersecurity

As a consequence, deploying the Sliver put up-exploitation framework to the /knowledge directory and executing ICT studies no issues, Eclypsium discovered, suggesting that the instrument supplies a “phony sense of security.”

It can be value noting that risk actors have also been observed tampering with the crafted-in ICT on compromised Ivanti Connect Secure products in an attempt to sidestep detection.

In a theoretical attack demonstrated by Eclypsium, a menace actor could drop their future-stage tooling and retail outlet the harvested details in the /details partition and then abuse a further zero-day flaw to acquire obtain to the gadget and exfiltrate the data staged formerly, all the whilst the integrity software detects no signals of anomalous activity.

“There will have to be a system of checks and balances that will allow prospects and 3rd-events to validate products integrity and security,” the organization stated. “The much more open this process is, the improved work we can do to validate the digital provide chain, particularly the components, firmware, and program components used in their goods.”

“When suppliers do not share facts and/or run a shut process, validation becomes difficult, as does visibility. Attackers will most unquestionably, as evidenced a short while ago, acquire edge of this circumstance and exploit the deficiency of controls and visibility into the process.”

Located this report appealing? Abide by us on Twitter  and LinkedIn to read more distinctive articles we write-up.


Some components of this article are sourced from:
thehackernews.com

Previous Post: «how nation state actors target your business: new research exposes major How Nation-State Actors Target Your Business: New Research Exposes Major SaaS Vulnerabilities
Next Post: Russian Turla Hackers Target Polish NGOs with New TinyTurla-NG Backdoor russian turla hackers target polish ngos with new tinyturla ng backdoor»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.