HomeCII/OTSerious Adversaries Target Ivanti CSA Zero-Day Flaws

Serious Adversaries Target Ivanti CSA Zero-Day Flaws

Published on

spot_img

A recent cybersecurity threat has been making headlines as researchers discovered a series of interconnected zero-day vulnerabilities in Ivanti’s Cloud Service Appliance (CSA) that allowed a highly skilled cyberattacker to breach a target network and carry out malicious activities. The severity of this attack led experts to believe that a nation-state actor was behind the orchestrated assault.

Fortinet’s FortiGuard Labs conducted an investigation and revealed their findings, cautioning organizations that are running Ivanti’s CSA version 4.6 and earlier versions to take immediate remediation measures to protect themselves from potential attacks utilizing this exploit. The publication of these new findings coincided with the disclosure of several other security flaws in Ivanti’s CSA that are currently being actively exploited by malevolent actors.

According to Fortinet’s report, the attackers leveraged a combination of three specific zero-day vulnerabilities within Ivanti CSA to gain initial access to the targeted network. These flaws included a command injection vulnerability in the DateTimeTab.php resource (CVE-2024-8190), a critical path traversal vulnerability in the /client/index.php resource (CVE-2024-8963), and an unauthenticated command injection vulnerability in the reports.php resource (CVE-2024-9380).

Once inside the network, the threat actors deployed a web shell by exploiting the command injection flaw in the reports.php resource. They further exploited an SQL injection vulnerability in Ivanti’s backend SQL database server (SQLS) (CVE-2024-29824) to achieve remote execution on the SQLS system, enabling them to maintain persistent access to the compromised network.

In response to Ivanti releasing a patch for the command injection vulnerability, the attackers took preemptive action to prevent other threat actors from capitalizing on the same vulnerabilities. The FortiGuard Labs team noted that the attackers patched the vulnerabilities themselves after the public advisory was issued, signaling a tactic commonly employed by cybercriminals to protect their foothold in a compromised network.

Analysts involved in the investigation also uncovered evidence suggesting that the threat actors were employing advanced techniques such as launching a DNS tunneling attack via PowerShell and deploying a Linux kernel object rootkit on the compromised CSA system. These activities indicated a deliberate effort to maintain kernel-level persistence on the affected devices, potentially surviving even a factory reset.

The motive behind the cyberattack remains unclear, but the sophisticated nature of the tactics used by the threat actors underscores the need for organizations to remain vigilant and proactive in securing their networks against evolving threats. As cybersecurity threats continue to escalate in complexity and severity, it is imperative for businesses to prioritize robust security measures and timely patch management to mitigate the risks posed by zero-day vulnerabilities and advanced persistent threats.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...