New Ivanti RCE flaw might affect 16,000 uncovered VPN gateways

Roughly 16,500 Ivanti Join Safe and Poly Safe gateways uncovered on the web are possible susceptible to a distant code execution (RCE) flaw the seller addressed earlier this week.

The flaw is tracked as CVE-2024-21894 and is a high-severity heap overflow within the IPSec part of Ivanti Join Safe 9.x and 22.x, doubtlessly permitting unauthenticated customers to trigger denial of service (DoS) or obtain RCE by sending specifically crafted requests.

Upon disclosure, on April 3, 2024, the web search engine Shodan confirmed 29,000 internet-exposed situations, whereas risk monitoring service Shadowserver reported seeing roughly 18,000.

On the time, Ivanti acknowledged that it had seen no indicators of energetic exploitation in any of its prospects however urged system directors to use the updates as quickly as doable.

Two days later, Shadowserver added CVE-2024-21894 into its scanning capabilities, reporting that about 16,500 situations are susceptible to the RCE flaw.

Vulnerable Ivanti endpoints worldwide
Weak Ivanti endpoints worldwide (Shadowserver)

Most of these situations (4,700) are in the US, with Japan (2,000), the UK (1,000), Germany (900), France (900), China (500), the Netherlands (500), Spain (500), Canada (330), India (330), and Sweden (320) following with important stage of publicity too.

Excessive-risk vulnerabilities in Ivanti merchandise typically act as a degree of breach for organizations worldwide.

Earlier this 12 months, it was revealed that state-sponsored risk actors leveraged a number of flaws in Ivanti merchandise, particularly CVE-2023-46805, CVE-2024-21887, CVE-2024-22024, and CVE-2024-21893, whereas they had been zero-days, that means the seller did not know in regards to the flaws and no fixes had been out there.

This exercise was adopted by a number of hacking teams exploiting widespread exploitation to deploy customized internet shells to backdoor units.

A report revealed right this moment by Mandiant dives deeper into high-profile current bug exploitation circumstances concentrating on Ivanti endpoints, specializing in Chinese language hackers from 5 distinct exercise clusters and a malware household named ‘SPAWN’ utilized in these assaults.

System directors who haven’t utilized the out there mitigations and fixes for CVE-2024-21894 are suggested to observe the seller’s directions on this data base article.

Recent articles

Patch Alert: Essential Apache Struts Flaw Discovered, Exploitation Makes an attempt Detected

î ‚Dec 18, 2024î „Ravie LakshmananCyber Assault / Vulnerability Risk actors are...

Meta Fined €251 Million for 2018 Knowledge Breach Impacting 29 Million Accounts

î ‚Dec 18, 2024î „Ravie LakshmananKnowledge Breach / Privateness Meta Platforms, the...

LEAVE A REPLY

Please enter your comment!
Please enter your name here