Security

Patches

Ivanti releases patches for VPN zero-days, discloses two more high-severity vulns

Many versions still without fixes while sophisticated attackers bypass mitigations


Ivanti has finally released the first round of patches for vulnerability-stricken Connect Secure and Policy Secure gateways, but in doing so has also found two additional zero-days, one of which is under active exploitation.

The news comes days after Ivanti, which releases its patches on a staggered schedule, said the first batch of fixes – due last week – was delayed, and many versions remain without official fixes.

Patches are now available for versions 9.1R14.4, 9.1R17.2, 9.1R18.3, 22.4R2.2, 22.5R1.1, and ZTA version 22.6R1.3, which will be welcome news to admins fearful of becoming the next target among a growing number of victims.

Admins are advised "out of an abundance of caution" to also factory-reset their devices before applying the patch. This is to prevent any possibility of an attacker gaining upgrade persistence. Ivanti said the process will take up to four hours to complete.

Given the state of exploitation of these vulnerabilities, it goes without saying that these patches should be applied as soon as possible.

To recap, earlier this month security researchers at Volexity disclosed the two-bug zero-day exploit they believed to be carried out by an unknown group with a suspected China nexus. The researchers said the vulnerabilities make it "trivial" for remote unauthenticated attackers to achieve code execution.

At the time, Ivanti said fewer than ten victims were believed to have been breached but this quickly increased and was under mass exploitation within days. 

Ivanti also said it would develop patches not by version order, but according to the version with the most installs. Patches were expected to drop between January 22 and February 19, but some of these have since been delayed slightly.

Customers in the meantime were advised to apply the mitigation available via the Ivanti download portal and use the external version of Ivanti's internal integrity checker (ICT), alongside proactive threat-hunting practices to monitor for suspected compromises.

To make matters worse, this week the US Cybersecurity and Infrastructure Security Agency (CISA) said Ivanti's mitigation was bypassed by some sophisticated attackers.

"Threat actors are continuing to leverage vulnerabilities in Ivanti Connect Secure and Policy Secure Gateways to capture credentials and/or drop webshells that enable further compromise of enterprise networks," the alert reads.

"Some threat actors have recently developed workarounds to current mitigations and detection methods and have been able to exploit weaknesses, move laterally, and escalate privileges without detection. CISA is aware of instances in which sophisticated threat actors have subverted the external ICT, further minimizing traces of their intrusion."

CISA suggests organizations should continue to proactively hunt for threats to systems connected to vulnerable Ivanti devices. It also advised monitoring account authentication, usage, and identity management services that could be exposed, isolating them from enterprise resources where possible.

In releasing today's round of patches, Ivanti also updated its mitigation in a bid to keep attackers at bay for now. This can be applied via the download portal like the last one.

The vendor didn't mention any changes being made to the external ICT, however, despite current intelligence indicating attackers can get around its detection capabilities.

More zero-days?

That mitigation will also apply to the two additional zero-days announced today which affect all supported versions of Connect Secure, Policy Secure, and ZTA gateways.

"Upon learning of these vulnerabilities, we immediately mobilized resources and the patch is available now via the standard download portal for Ivanti Connect Secure," said Ivanti in an advisory.

"It is critical that you immediately take action to ensure you are fully protected."

Tracked as CVE-2024-21888 and CVE-2024-21893, they both carry high-severity CVSS scores. Ivanti's descriptions for both are:

Ivanti said there is no evidence to suggest that CVE-2024-21888 is under active exploitation, but a small number of customers have been hit by the server-side request forgery flaw.

It's not clear if the discovery of these two additional vulnerabilities was the cause of the overall delay in the patch schedule. The Register has asked Ivanti to comment.

A spokesperson at Ivanti sent a statement:

"The security of our customers is our top priority. As part of our ongoing investigation, we discovered two additional vulnerabilities in Ivanti Connect Secure and Ivanti Policy Secure. We included a fix for these vulnerabilities and previously identified vulnerabilities in the patch released today, and patches planned for release for additional versions will also include a comprehensive fix. And the patches released on January 31 cover the majority of our customers. We have also provided a new mitigation in the best interest of customers while the remaining patch versions are in development.

"We strongly encourage customers to apply the patch for their version as it becomes available. While additional patch versions are in development, they should apply the mitigation and run the internal and external ICT." ®

Send us news
8 Comments

Tired of airport security queues? SQL inject yourself into the cockpit, claim researchers

Infosec hounds say they spotted vulnerability during routine travel in the US

Check your IP cameras: There's a new Mirai botnet on the rise

Also, US offering $2.5M for Belarusian hacker, Backpage kingpins jailed, additional MOVEit victims, and more

White House’s new fix for cyber job gaps: Serve the nation in infosec

Now do your patriotic duty and fill one of those 500k open roles, please?

US sues Georgia Tech over alleged cybersecurity failings as a Pentagon contractor

Rap sheet spells out major no-nos after disgruntled staff blow whistle

Brain Cipher claims attack on Olympic venue, promises 300 GB data leak

French police reckon financial system targeted during Summer Games

SolarWinds left critical hardcoded credentials in its Web Help Desk product

Why go to the effort of backdooring code when devs will basically do it for you accidentally anyway

Homeland security hopes to scuttle maritime cyber-threats with port infosec testbed

Supply chains, 13M jobs and $649B a year at risk, so Uncle Sam is fighting back - with a request for info

Cisco's Smart Licensing Utility flaws suggest it's pretty dumb on security

Two critical holes including hardcoded admin credential

Multiple flaws in Microsoft macOS apps unpatched despite potential risks

Windows giant tells Cisco Talos it isn't fixing them

Deadline looms: Google Workspace mandates OAuth by September 30

27 days to get your users' third-party apps on Google’s sign-in

RansomHub hits 210 victims in just 6 months

The ransomware gang recruits high-profile affiliates from LockBit and ALPHV

AMD reverses course: Ryzen 3000 CPUs will get SinkClose patch after all

Still no love for 1000- or 2000-series