Wednesday, March 12, 2025
- Advertisment -
Google search engine
HomeCRIME & PUNISHMENTCYBERCRIMEFBI, CISA Release 'Threat Actors Chained Vulnerabilities in IvantiCloud Service Applications'

FBI, CISA Release ‘Threat Actors Chained Vulnerabilities in IvantiCloud Service Applications’

The Cybersecurity and Infrastructure Security Agency and Federal Bureau of Investigation are releasing this joint cybersecurity advisory in response to the exploitation in September 2024 of vulnerabilities in Ivanti Cloud Service Appliances: CVE-2024-8963, an administrative bypass vulnerability; CVE2024-9379, a SQL injection vulnerability; and CVE-2024-8190 and CVE-2024-9380, remote code execution vulnerabilities.

According to CISA and trusted third-party incident response data, threat actors chained the listed vulnerabilities to gain initial access, conduct remote code execution, obtain credentials, and implant webshells on victim networks.

The actors’ primary exploit paths were two vulnerability chains. One exploit chain leveraged CVE-2024-8963 in conjunction with CVE-2024-8190 and CVE-2024-9380 and the other exploited CVE-2024-8963 and CVE-2024-9379. In one confirmed compromise, the actors moved laterally to two servers.

All four vulnerabilities affect Ivanti CSA version 4.6x versions before 519, and two of the vulnerabilities (CVE-2024-9379 and CVE-2024-9380) affect CSA versions 5.0.1 and below; according to Ivanti, these CVEs have not been exploited in version 5.0.

Ivanti CSA 4.6 is End-of-Life (EOL) and no longer receives patches or third-party libraries. CISA and FBI strongly encourage network administrators to upgrade to the latest supported version of Ivanti CSA.

Network defenders are encouraged to hunt for malicious activity on their networks using the detection methods and indicators of compromise within this advisory. Credentials and sensitive data stored within the affected Ivanti appliances should be considered compromised. OrganiSations should collect and analyze logs and artefacts for malicious activity and apply the incident response recommendations within this advisory.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here
Captcha verification failed!
CAPTCHA user score failed. Please contact us!
- Advertisment -
Google search engine

Latest Posts

MOST READ

Share via
Copy link