Ivanti, a well-known software company, recently fixed a critical security flaw in its Virtual Traffic Manager (vTM) application delivery controller (ADC). This vulnerability could potentially allow remote, unauthorized entities to bypass authentication and gain access to the vTM’s admin panel, creating an administrator account for malicious activities. The severity of this bug, labeled CVE-2024-7593, has been rated 9.8 out of 10 on the Common Vulnerability Scoring System (CVSS) ratings scale.
According to Patrick Tiquet, the Vice President of Security and Architecture at Keeper Security, the exploitation of this authentication bypass bug could lead to various malicious activities such as data theft, service interruptions, and compromise of sensitive systems. Additionally, bypassing authentication could enable further network exploitation, escalating the impact of the initial breach.
While there have been no reported attacks on customers through CVE-2024-7593, Ivanti did confirm the availability of a proof-of-concept (PoC) exploit in the public domain. Dark Reading also discovered an exploit for vADC on the Exploit Database (Exploit-DB) uploaded by a user named “ohnoisploited,” although Ivanti clarified that this was not the PoC referenced in its advisory.
This incident is not an isolated one for Ivanti, as the company has faced multiple security lapses this year. Starting with critical zero-day vulnerabilities, Ivanti has continuously dealt with security issues, with hackers exploiting these weaknesses and causing disruptions for various organizations. Despite these challenges, Ivanti has been proactive in releasing patches to address these vulnerabilities. Patched versions like 22.2R1 and 22.7R2 are secure against CVE-2024-7593, and more updates are expected to be rolled out soon.
In addition to patching, organizations can also enhance their security posture by adjusting vTM settings to limit the exposure of the management panel to internal, trusted IP addresses. By following industry best practices and restricting access to the management interface, organizations can reduce their attack surface and mitigate the risk of potential breaches.
Overall, Ivanti’s response to this security vulnerability showcases the company’s commitment to addressing and resolving critical issues promptly. By releasing patches and providing guidance on security best practices, Ivanti aims to protect its customers and strengthen the security of its products. Moving forward, continued vigilance and proactive security measures will be essential to safeguard against potential threats and vulnerabilities in the evolving cybersecurity landscape.
