www.belgium.be Logo of the federal government

WARNING: IVANTI RELEASES SECURITY UPDATE TO ADRESS VULNERABILITIES IN IVANTI CONNECT SECURE, IVANTI POLICY SECURE GATEWAYS!

Reference: 
Advisory #2024-17
Version: 
3.0
Affected software: 
Ivanti Connect Secure
Ivanti Policy Secure
Ivanti Neurons for Zero Trust Access (ZTA)
Type: 
Authentication bypass (CVE-2023-46805), command Injection (CVE-2024-21887), privilege escalation (CVE-2024-21888) & server-side request forgery (CVE-2024-21893)
CVE/CVSS: 
CVE-2023-46805: CVSS 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N)
CVE-2024-21887: CVSS 9.1 (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H) 
CVE-2024-21888: CVSS 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
CVE-2024-21893: CVSS 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N)
CVE-2024-22024: CVSS 8.3 (AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L)

Sources

https://forums.ivanti.com/s/article/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US
https://forums.ivanti.com/s/article/CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US
https://forums.ivanti.com/s/article/CVE-2024-22024-XXE-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure?language=en_US
https://forums.ivanti.com/s/article/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US
https://www.cisa.gov/news-events/news/cisa-us-and-international-partners-warn-ongoing-exploitation-multiple-ivanti-vulnerabilities

Risks

Ivanti has released a security update to address two actively exploited vulnerabilities, an authentication bypass vulnerability (CVE-2023-46805) and a command injection vulnerability (CVE-2024-21887) in Ivanti Connect Secure and Ivanti Policy Secure Gateways.

As part of the ongoing investigation, two additional vulnerabilities (CVE-2024-21888 and CVE-2024-21893) were identified in Ivanti Connect Secure Ivanti Policy Secure, and Ivanti Neurons for ZTA and were addressed in the same patch.

Initially, the exploitation of CVE-2024-21893 appeared to be targeted.

CVE-2024-22024:  XML eXternal Entity injection (XXE)
An XML external entity or XXE vulnerability in the SAML component of Ivanti Connect Secure, Ivanti Policy Secure and ZTA gateways may allow an unauthenticated attacker to access certain restricted resources.

All mentioned vulnerabilities pose a significant threat to the Confidentiality, Integrity, and Availability (CIA) triad of information security.

UPDATE 01/03/2024: In a Joint Cybersecurity Advisory, CISA and other partners warn about the active exploitation of CVE-2023-46805, CVE-2024-21887 and CVE-2024-21893 in a chain of exploits to bypass authentication, craft malicious requests and execute arbitrary commands with elevated privileges.

Description

These vulnerabilities affect all supported versions 9.x and 22.x of Ivanti Connect Secure (ICS), (formerly known as Pulse Connect Secure) and of Ivanti Policy Secure gateways.
 
CVE-2024-21888 is a privilege escalation vulnerability in web component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x). The exploitation of the vulnerability allows a user to elevate privileges to that of an administrator and thus to highly impact the CIA triad of information security. 
 
CVE-2024-21893 is a server-side request forgery vulnerability in the Security Assertion Markup Language (SAML) component of Ivanti Connect Secure (9.x, 22.x), Ivanti Policy Secure (9.x, 22.x) and Ivanti Neurons for ZTA. If exploited, the vulnerability would allow an attacker to access certain restricted resources without authentication, mainly affecting the confidentiality of information security.
 
These are additional vulnerabilities discovered in Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA.

Recommended Actions

Patch

The Centre for Cybersecurity Belgium strongly recommends installing updates for vulnerable devices with the highest priority, after thorough testing.

Ivanti has released a patch for Ivanti Connect Secure and ZTA. Customers can access the patch via the standard download portal, login required.

As a best practice, it is recommended that customers factory reset their appliance before applying the patch to prevent the threat actor from gaining upgrade persistence in your environment.

The remaining patches for supported versions will still be released on a staggered schedule.

Mitigate

CVE-2023-46805, CVE-2024-21887, CVE-2024-21888, CVE-2024-21893, and CVE-2024-22024 can be mitigated by importing the mitigation file via the download portal.

Please note: If a customer has applied the patch, they do not need to apply the mitigation. If mitigation is applied before the patch, it can be removed once the patch has been applied.

Monitor/Detect

The CCB recommends organizations upscale monitoring and detection capabilities to identify any related suspicious activity, ensuring a swift response in case of an intrusion.

In case of an intrusion, you can report an incident via: https://cert.be/en/report-incident

While patching appliances or software to the newest version may provide safety from future exploitation, it does not remediate historic compromise.

References