Powered by MOMENTUM MEDIA
cyber daily logo
Breaking news and updates daily. Subscribe to our Newsletter

Ivanti discovers new vulnerability that is already being exploited

Ivanti continues to face vulnerability concerns, with the company discovering a new bug already being exploited.

user icon Daniel Croft
Wed, 07 Feb 2024
Ivanti discovers new vulnerability that is already being exploited
expand image

The company discovered CVE-2024-21893 on 31 January 2024 during investigations and patching of previously discovered vulnerabilities, CVE-2023-46805 and CVE-2024-21887.

The new vulnerability is a server-side request forgery (SSRF) vulnerability, a bug that would allow an attacker to cause the server-side system to make requests to a different location.

“The vulnerabilities allow for an unauthenticated threat actor to execute arbitrary commands on the appliance with elevated privileges,” wrote cyber security firm Mandiant.

============
============

For example, a threat actor could cause the server-side application to connect with internal-only services within a company infrastructure.

Mandiant said it has observed a large number of instances of the vulnerability being exploited, while Shadowserver and Rapid7 have also said that the vulnerability is being used by threat actors in the wild.

The US Cybersecurity and Infrastructure Security Agency has advised companies to disconnect Ivanti Connect Secure until vulnerabilities have been patched.

Daniel Croft

Daniel Croft

Born in the heart of Western Sydney, Daniel Croft is a passionate journalist with an understanding for and experience writing in the technology space. Having studied at Macquarie University, he joined Momentum Media in 2022, writing across a number of publications including Australian Aviation, Cyber Security Connect and Defence Connect. Outside of writing, Daniel has a keen interest in music, and spends his time playing in bands around Sydney.

newsletter
cyber daily subscribe
Be the first to hear the latest developments in the cyber industry.