forums.ivanti.com
Open in
urlscan Pro
2606:4700::6811:7088
Public Scan
URL:
https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-and-Policy-Secure-CVE-2024-37404?language=en_US
Submission: On October 14 via api from IN — Scanned from CA
Submission: On October 14 via api from IN — Scanned from CA
Form analysis
0 forms found in the DOMText Content
Loading ×Sorry to interrupt CSS Error Refresh Skip to Main Content Community * Home * All Products * Forum Groups * Contact Support * Getting Started * Advantage Learning * Ivanti User Groups * Ivanti Ideas * Product End of Life * Site Resources * More Expand search SearchLoading Close search Log inAccount Management Ask a Question Log in for access to this feature Security Advisory Ivanti Connect Secure and Policy Secure (CVE-2024-37404) Primary Product Created Date Oct 8, 2024 2:01:32 PM Last Modified Date Oct 9, 2024 9:31:50 PM Summary Ivanti has released updates for Ivanti Connect Secure and Policy Secure which addresses a critical vulnerability. Successful exploitation could allow a remote authenticated attacker to achieve remote code execution. We are not aware of any customers being exploited by this vulnerability at the time of disclosure. Vulnerability Details: CVE Number Description CVSS Score (Severity) CVSS Vector CWE CVE-2024-37404 Improper Input Validation in the admin portal of Ivanti Connect Secure before 22.7R2.1 and 9.1R18.9, or Ivanti Policy Secure before 22.7R1.1 allows a remote authenticated attacker to achieve remote code execution. 9.1 (Critical) CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H CWE-93 Affected Versions Product Name Affected Version(s) Resolved Version(s) Patch Availability Ivanti Connect Secure All versions before 22.7R2.1 All versions before 9.1R18.9 22.7R2.1 22.7R2.2 9.1R18.9 (to be released on October 15) Download Portal https://forums.ivanti.com/s/product-downloads Ivanti Policy Secure All versions before 22.7R1.1 22.7R1.1 Download Portal https://forums.ivanti.com/s/product-downloads Solution Fixes are currently available for download in the standard download portal for Ivanti Connect Secure 22.7R2.1 and 22.7R2.2 and Ivanti Policy Secure 22.7R1.1. A fix will also be provided in 9.1R18.9 for ICS, which is set to be released on October 15. We recommend that customers upgrade to the latest versions which contain the fix. Additionally, customers can follow the mitigation instructions below to reduce their risk of exploitation. Mitigation or Workaround This vulnerability is accessible only via authenticated admin access. To exploit this vulnerability, a threat actor must have access to the admin portal and must have access to compromised admin credentials that allow him/her to login to the system. Exposure to this vulnerability can be reduced by following standard industry practices for deploying networking devices that are present on the internet. 1. Ensure that the admin access is enabled on the management interface only. Ivanti Connect Secure and Policy Secure provide a separate management port to allow customers to configure admin access on a separate port. 2. Ensure that the management interface is connected to an isolated internal network with private IP space that is isolated from the internet by a firewall or a jump-host. 3. Customers should also use standard practices to protect access to critical infrastructure such as strong passwords, appropriate password rotation policies, vaults, and MFA which will further limit the risk of exploitation. 4. Additionally, customers should enable the admin logging functionality to monitor and detect any unauthorized actions by unauthorized administrators attempting to exploit this vulnerability. Acknowledgements Ivanti would like to thank the following for reporting the relevant issue and for working with Ivanti to help protect our customers: * Richard Warren of AmberWolf Note: Ivanti is dedicated to ensuring the security and integrity of our enterprise software products. We recognize the vital role that security researchers, ethical hackers, and the broader security community play in identifying and reporting vulnerabilities. Visit HERE to learn more about our Vulnerability Disclosure Policy. FAQ 1. Are you aware of any active exploitation of these vulnerabilities? We are not aware of any customers being exploited by these vulnerabilities prior to public disclosure. These vulnerabilities were disclosed through our responsible disclosure program. 2. How can I tell if I have been compromised? Currently, there is no known public exploitation of this vulnerability that could be used to provide a list of indicators of compromise. 3. Will Ivanti be backporting fixes to additional versions of ICS and IPS? No. The bulk of Ivanti’s current development effort on these solutions is on the security hardening of the underlying operating system which we announced in April. We reviewed this vulnerability and the mitigation available for customers on older versions to apply (ensuring their admin portal is not exposed to the internet) and decided not to redirect resources from the security hardening effort for this point fix. 4. What should I do if I need help? If you have questions after reviewing this information, you can log a case and/or request a call via the Success Portal Article Number : 000095259 Article Promotion Level Normal * * Terms & Conditions * Privacy Policy * Copyright © 2019-2023 Ivanti. All rights reserved. Loading WE USE COOKIES 🍪 We use cookies to optimize the website performance, content, and the overall experience. Privacy Policy Cookies Settings Got it PRIVACY PREFERENCE CENTER YOUR PRIVACY YOUR PRIVACY We use cookies on this site to improve your browser experience, analyze usage and traffic, tailor future content to your preferences, and make decisions about our website. Select "Allow All" to accept cookies and go directly to the site, or select a category of cookies from the menu to learn more about each type of cookie. More information * STRICTLY NECESSARY STRICTLY NECESSARY Always Active Strictly Necessary These cookies are required to enable core site functionality. Cookie Details * PERFORMANCE COOKIES PERFORMANCE COOKIES Performance Cookies These cookies allow us to analyze site performance and usage, so we can ensure you have the best experience. Cookie Details * PERSONALIZATION COOKIES PERSONALIZATION COOKIES Personalization Cookies These cookies can be set through our website by our advertising partners. They can be used by these companies to build a profile of your interests and show you relevant ads on other websites. Cookie Details * FUNCTIONAL COOKIES FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalization. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Cookie Details Back Button ADVERTISING COOKIES Filter Button Consent Leg.Interest Select All Vendors Select All Vendors Select All Hosts Select All Clear Filters Information storage and access Apply Save Settings Allow All