HomeCyber BalkansIvanti Reveals 2 New Zero-Days, 1 Currently Under Active Exploitation

Ivanti Reveals 2 New Zero-Days, 1 Currently Under Active Exploitation

Published on

spot_img

Two new zero-day vulnerabilities have been discovered in Ivanti Connect Secure and Ivanti Policy Secure products, identified as CVE-2024-21888 and CVE-2024-21893. Furthermore, it has been reported that one of the vulnerabilities (CVE-2024-21893) has been exploited in the wild by threat actors.

In response to the discovery of these vulnerabilities, Ivanti has issued a security advisory advising all of its customers to patch their systems accordingly. It is important to note that earlier this month, Ivanti Connect Secure was also reported to have a zero-day vulnerability, which was similarly exploited in the wild by threat actors.

The CVE-2024-21888 vulnerability, a Privilege Escalation vulnerability, is attributable to a web component of Ivanti Connect Secure and Ivanti Policy Secure. This flaw enables a threat actor to elevate their privileges to that of an administrator, provided that the threat actor has a user privilege on the vulnerable device. The severity of this vulnerability has been rated as 8.8 (High), but as of yet, there have been no confirmed instances of exploitation.

The second vulnerability, CVE-2024-21893, is a Server-Side Request Forgery flaw that exists in the SAML component of Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA. This vulnerability allows a threat actor to access unrestricted resources without authentication. The severity of this vulnerability has been rated as 8.2 (High), and it has been reported to be actively exploited by threat actors in the wild.

Notably, both of these vulnerabilities have been included in the CISA’s Known Vulnerability Catalog, alongside previously exploited vulnerabilities CVE-2024-21887 and CVE-2023-46805.

Ivanti has made available fixed versions for the affected products, with versions 9.1R14.4, 9.1R17.2, 9.1R18.3, 22.4R2.2, and 22.5R1.1 for Ivanti Connect Secure and Ivanti Policy Secure, and ZTA version 22.6R1.3. Users of these products are strongly urged to upgrade to the latest versions in order to protect their systems from potential exploitation by threat actors.

In light of these developments, Trustifi’s Advanced threat protection platform has been recommended as an essential defense measure. Trustifi’s uses sophisticated AI-powered email protection technology to prevent the widest spectrum of sophisticated cyber attacks before they reach a user’s mailbox. Interested parties are encouraged to take advantage of Trustifi’s Free Threat Scan to further bolster their cybersecurity defenses against such exploits.

Source link

Latest articles

Rising Cyber Threats and Stagnant Headcount

Rising Cyber Threats: The Challenges Facing SLTT Organizations On March 13, 2026, the Center for...

Prompt Injection Transforms Google’s Antigravity File Search into Remote Code Execution

Google's Sandbox Never Stood a Chance: An Examination of Security Flaws Recent developments have shed...

Thousands of Apache ActiveMQ Instances Remain Unpatched Weeks After Discovery of Actively Exploited Vulnerability

In today’s rapidly evolving technological landscape, organizations are increasingly urged to reassess their cybersecurity...

More like this

Rising Cyber Threats and Stagnant Headcount

Rising Cyber Threats: The Challenges Facing SLTT Organizations On March 13, 2026, the Center for...

Prompt Injection Transforms Google’s Antigravity File Search into Remote Code Execution

Google's Sandbox Never Stood a Chance: An Examination of Security Flaws Recent developments have shed...

Thousands of Apache ActiveMQ Instances Remain Unpatched Weeks After Discovery of Actively Exploited Vulnerability

In today’s rapidly evolving technological landscape, organizations are increasingly urged to reassess their cybersecurity...