CISA Alerts on Ivanti Vulnerabilities Exploited in Cyber Attacks

January 23, 2025

The Cybersecurity and Infrastructure Security Agency (CISA) and the FBI have issued a warning about threat actors exploiting a series of vulnerabilities in Ivanti's Cloud Service Appliance (CSA). These vulnerabilities are being used to gain initial access, snatch credentials, and install harmful scripts on users' devices.

The new threat vector utilized by cyber attackers involves several Ivanti vulnerabilities, which are being exploited to undermine the company's CSA. The identified vulnerabilities include CVE-2024-8963, an admin bypass vulnerability; CVE-2024-9379, a SQL injection vulnerability; and CVE-2024-8190 and CVE-2024-9380, both of which are remote code execution (RCE) vulnerabilities.

CISA, utilizing third-party incident-response data, discovered that threat actors are using these bugs by linking them together to gain initial access. This allows them to carry out remote code execution (RCE), obtain credentials, and install Web shells on victim networks. "All four vulnerabilities affect Ivanti CSA version 4.6x versions before 519, and two of the vulnerabilities (CVE-2024-9379 and CVE-2024-9380) affect CSA versions 5.0.1 and below; according to Ivanti, these CVEs have not been exploited in version 5.0," CISA mentioned in the advisory.

To counter these threats, both organizations advise network administrators to upgrade to the most recent supported version of Ivanti CSA. They also recommend using detection methods and the indicators of compromise (IoCs) provided in the CISA advisory to search for malicious activity on their networks. If organizations detect a compromise, it is suggested to isolate or take offline potentially affected hosts and reimage them. Admins are also advised to provide new account credentials, collect and review artifacts, and report the compromise to CISA.

Furthermore, it's recommended to exercise, test, and validate a security program against threat actors listed in the MITRE ATT&CK for Enterprise framework.

Related News

Latest News

Like what you see?

Get a digest of headlines, vulnerabilities, risk context, and more delivered to your inbox.

Subscribe Below

By submitting this form, you’re giving us permission to email you. You may unsubscribe at any time.

Accelerate Security Teams

Continuously identify and prioritize the risks that are most critical in your environment, and validate that your remediation efforts are reducing risk. An always-on single source-of-truth of your assets, services, and vulnerabilities.