Researchers have released and reported active exploitation of a collection of four different vulnerabilities (CVE-2023-46805, CVE-2024-21887, CVE-2024-21888, and CVE-2024-21893) in Ivanti Connect Secure VPN and Ivanti Policy Secure appliances. These vulnerabilities allow attackers to remotely run elevated commands on the appliances.
Documented cases of exploitation and the impact of these attacks on organizations have resulted in CVSS scores ranging between 8.2 and 9.1. Networking devices that are susceptible to this issue include Ivanti Connect Secure (ICS), formerly known as Pulse Connect Secure and Ivanti Policy Secure gateways. These vulnerabilities impact all supported versions – Version 9.x and 22.x.. Threat actors have developed several custom tools like web shells and credential harvesters to maintain persistence and exfiltrate data from compromised appliances. They have also exhibited awareness of device configurations and logging to carefully cover their tracks. Between the broad vulnerability, active exploitation, and sophisticated tactics, this poses a serious breach risk with potential impacts like network access compromise, data theft, and lateral movement.
Ivanti has begun releasing patches for affected appliances. Apply these patches to your versions of the impacted products as soon as they become available.
If patches are not yet available for your version, apply the mitigations recommended by Ivanti immediately. However, note that some configurations can negatively impact the appliances and the guidance by Ivanti should be followed.
Immediately reset passwords for any systems or accounts that might have been compromised. This is especially critical for local user accounts on the appliance and any users who authenticated to the appliance during the period of known malware activity.
Run the internal ICT first, followed by the external ICT to check for any tampering or bypass mechanisms installed by attackers. Share the ICT results with Ivanti for further analysis.
Mandiant has created a remediation and hardening guide that can be followed that is specific to the released vulnerabilities.
Researchers have identified many post-exploit attacks that utilize open-source tooling. Reports have listed programs such as Impacket, CrackMapExec, Iodine, and Enum4Linux among those exploiting these vulnerabilities. The Incident Detection Engineering team is actively working on creating additional detections surrounding known TTPs. Blumira also currently has many different detections for this activity including:
It’s nearly impossible for admins to track every vulnerability, but Blumira’s security experts perform threat hunting on your behalf and develop detections in real time to protect your environment. Blumira is actively working on a detection for QueueJumper for its customers.
Blumira’s Free SIEM is easy to deploy; IT and security teams can start seeing immediate security value for their organizations.
Sign up for free and connect to your Microsoft 365 environment in minutes to start detecting and mitigating exposure related to Windows vulnerabilities.