www.horizon3.ai
Open in
urlscan Pro
104.197.16.226
Public Scan
URL:
https://www.horizon3.ai/attack-research/cisa-kev-cve-2024-8190-ivanti-csa-command-injection
Submission: On December 05 via api from IN — Scanned from CA
Submission: On December 05 via api from IN — Scanned from CA
Form analysis
2 forms found in the DOMGET https://www.horizon3.ai/
<form role="search" method="get" class="et_pb_menu__search-form" action="https://www.horizon3.ai/">
<input type="search" class="et_pb_menu__search-input" placeholder="Search …" name="s" title="Search for:">
</form>
GET https://www.horizon3.ai/
<form role="search" method="get" class="et_pb_menu__search-form" action="https://www.horizon3.ai/">
<input type="search" class="et_pb_menu__search-input" placeholder="Search …" name="s" title="Search for:">
</form>
Text Content
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent. Cookie Settings Accept All Privacy Overview This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience. NecessaryAlways Active Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously. * Cookie cookielawinfo-checkbox-advertisement * Duration 1 year * Description Set by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Advertisement" category . * Cookie __cfruid * Duration session * Description Cloudflare sets this cookie to identify trusted web traffic. * Cookie _GRECAPTCHA * Duration 5 months 27 days * Description This cookie is set by the Google recaptcha service to identify bots to protect the website against malicious spam attacks. * Cookie OptanonConsent * Duration 1 year * Description OneTrust sets this cookie to store details about the site's cookie category and check whether visitors have given or withdrawn consent from the use of each category. * Cookie CookieLawInfoConsent * Duration 1 year * Description Records the default button state of the corresponding category & the status of CCPA. It works only in coordination with the primary cookie. * Cookie viewed_cookie_policy * Duration 11 months * Description The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. * Cookie cookielawinfo-checkbox-necessary * Duration 11 months * Description This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". * Cookie cookielawinfo-checkbox-functional * Duration 11 months * Description The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". * Cookie cookielawinfo-checkbox-performance * Duration 11 months * Description This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". * Cookie cookielawinfo-checkbox-analytics * Duration 11 months * Description This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". * Cookie cookielawinfo-checkbox-others * Duration 11 months * Description This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. * Cookie __cf_bm * Duration 1 hour * Description This cookie, set by Cloudflare, is used to support Cloudflare Bot Management. * Cookie _cfuvid * Duration session * Description Calendly sets this cookie to track users across sessions to optimize user experience by maintaining session consistency and providing personalized services * Cookie cookieyes-consent * Duration 1 year * Description CookieYes sets this cookie to remember users' consent preferences so that their preferences are respected on subsequent visits to this site. It does not collect or store any personal information about the site visitors. Functional Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features. * Cookie bscookie * Duration 2 years * Description LinkedIn sets this cookie to store performed actions on the website. * Cookie UserMatchHistory * Duration 1 month * Description LinkedIn sets this cookie for LinkedIn Ads ID syncing. * Cookie lang * Duration session * Description LinkedIn sets this cookie to remember a user's language setting. * Cookie bcookie * Duration 1 year * Description LinkedIn sets this cookie from LinkedIn share buttons and ad tags to recognize browser ID. * Cookie lidc * Duration 1 day * Description LinkedIn sets the lidc cookie to facilitate data center selection. * Cookie AnalyticsSyncHistory * Duration 1 month * Description LinkedIn - Used to store information about the time a sync took place with the lms_analytics cookie * Cookie li_gc * Duration 6 months * Description LInkedIn Used to store consent of guests regarding the use of cookies for non-essential purposes * Cookie yt-remote-device-id * Duration Never Expires * Description YouTube sets this cookie to store the user's video preferences using embedded YouTube videos. * Cookie ytidb::LAST_RESULT_ENTRY_KEY * Duration Never Expires * Description The cookie ytidb::LAST_RESULT_ENTRY_KEY is used by YouTube to store the last search result entry that was clicked by the user. This information is used to improve the user experience by providing more relevant search results in the future. * Cookie yt-remote-connected-devices * Duration Never Expires * Description YouTube sets this cookie to store the user's video preferences using embedded YouTube videos. * Cookie yt-remote-session-app * Duration session * Description The yt-remote-session-app cookie is used by YouTube to store user preferences and information about the interface of the embedded YouTube video player. * Cookie yt-remote-cast-installed * Duration session * Description The yt-remote-cast-installed cookie is used to store the user's video player preferences using embedded YouTube video. * Cookie yt-remote-session-name * Duration session * Description The yt-remote-session-name cookie is used by YouTube to store the user's video player preferences using embedded YouTube video. * Cookie yt-remote-fast-check-period * Duration session * Description The yt-remote-fast-check-period cookie is used by YouTube to store the user's video player preferences for embedded YouTube videos. * Cookie sp_t * Duration 1 year * Description The sp_t cookie is set by Spotify to implement audio content from Spotify on the website and also registers information on user interaction related to the audio content. * Cookie sp_landing * Duration 1 day * Description The sp_landing is set by Spotify to implement audio content from Spotify on the website and also registers information on user interaction related to the audio content. Analytics Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc. * Cookie _ga_V462VSRXXS * Duration 2 years * Description This cookie is installed by Google Analytics. * Cookie _ga * Duration 1 year 1 month 4 days * Description The _ga cookie, installed by Google Analytics, calculates visitor, session and campaign data and also keeps track of site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognize unique visitors. * Cookie pardot * Duration past * Description The pardot cookie is set while the visitor is logged in as a Pardot user. The cookie indicates an active session and is not used for tracking. * Cookie CONSENT * Duration 2 years * Description YouTube sets this cookie via embedded youtube-videos and registers anonymous statistical data. * Cookie 6suuid * Duration 2 years * Description 6sense is a B2B predictive intelligence engine for marketing and sales. * Cookie visitorId * Duration 1 year * Description Salesforce * Cookie _gcl_au * Duration 3 months * Description Google Tag Manager sets the cookie to experiment advertisement efficiency of websites using their services. * Cookie _ga_* * Duration 1 year 1 month 4 days * Description Google Analytics sets this cookie to store and count page views. * Cookie ajs_user_id * Duration 1 year * Description This cookie is set by Segment to help track visitor usage, events, target marketing, and also measure application performance and stability. * Cookie ajs_group_id * Duration 1 year * Description This cookie is set by Segment to track visitor usage and events within the website. * Cookie ajs_anonymous_id * Duration 1 year * Description This cookie is set by Segment to count the number of people who visit a certain site by tracking if they have visited before. * Cookie _hjSessionUser_* * Duration 1 year * Description Hotjar sets this cookie to ensure data from subsequent visits to the same site is attributed to the same user ID, which persists in the Hotjar User ID, which is unique to that site. * Cookie _hjSession_* * Duration 1 hour * Description Hotjar sets this cookie to ensure data from subsequent visits to the same site is attributed to the same user ID, which persists in the Hotjar User ID, which is unique to that site. * Cookie demdex * Duration 6 months * Description The demdex cookie, set under the domain demdex.net, is used by Adobe Audience Manager to help identify a unique visitor across domains. * Cookie u * Duration 1 year * Description This cookie is used by Bombora to collect information that is used either in aggregate form, to help understand how websites are being used or how effective marketing campaigns are, or to help customize the websites for visitors. * Cookie _hjTLDTest * Duration session * Description To determine the most generic cookie path that has to be used instead of the page hostname, Hotjar sets the _hjTLDTest cookie to store different URL substring alternatives until it fails. * Cookie _gh_sess * Duration session * Description GitHub sets this cookie for temporary application and framework state between pages like what step the user is on in a multiple step form. Performance Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors. * Cookie _calendly_session * Duration 21 days * Description Calendly, a Meeting Schedulers, sets this cookie to allow the meeting scheduler to function within the website and to add events into the visitor’s calendar. * Cookie loglevel * Duration Never Expires * Description Squarespace sets this cookie to maintain settings and outputs when using the Developer Tools Console on the current session. Advertisement Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads. * Cookie yt.innertube::requests * Duration Never Expires * Description This cookie, set by YouTube, registers a unique ID to store data on what videos from YouTube the user has seen. * Cookie YSC * Duration session * Description YSC cookie is set by Youtube and is used to track the views of embedded videos on Youtube pages. * Cookie VISITOR_INFO1_LIVE * Duration 6 months * Description A cookie set by YouTube to measure bandwidth that determines whether the user gets the new or old player interface. * Cookie yt.innertube::nextId * Duration Never Expires * Description This cookie, set by YouTube, registers a unique ID to store data on what videos from YouTube the user has seen. * Cookie _rdt_uuid * Duration 3 months * Description Reddit sets this cookie to build a profile of your interests and show you relevant ads. * Cookie visitor_id* * Duration 1 year 1 month 4 days * Description Pardot sets this cookie to store a unique user ID. * Cookie visitor_id*-hash * Duration 1 year 1 month 4 days * Description Pardot sets this cookie to store a unique user ID. * Cookie VISITOR_PRIVACY_METADATA * Duration 6 months * Description YouTube sets this cookie to store the user's cookie consent state for the current domain. * Cookie ssi * Duration 1 year * Description This cookie is set by SiteScout and stores a unique ID that identifies a returning user’s device. The ID is used for targeted ads. * Cookie dpm * Duration 6 months * Description The dpm cookie, set under the Demdex domain, assigns a unique ID to each visiting user, hence allowing third-party advertisers to target these users with relevant ads. * Cookie ab * Duration 1 year * Description Owned by agkn, this cookie is used for targeting and advertising purposes. * Cookie test_cookie * Duration 15 minutes * Description doubleclick.net sets this cookie to determine if the user's browser supports cookies. * Cookie IDE * Duration 1 year 24 days 1 minute * Description Google DoubleClick IDE cookies store information about how the user uses the website to present them with relevant ads according to the user profile. Others Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet. * Cookie lpv971073 * Duration 1 hour * Description No description * Cookie _zitok * Duration 1 year * Description Description is currently not available. * Cookie debug * Duration Never Expires * Description No description available. * Cookie __tld__ * Duration session * Description Description is currently not available. * Cookie ajs%3Atest * Duration 1 year * Description No description available. * Cookie ajs%3Acookies * Duration 1 year * Description No description available. * Cookie _octo * Duration 1 year * Description No description available. * Cookie logged_in * Duration 1 year * Description No description available. * Cookie cf_clearance * Duration 1 year * Description Description is currently not available. Save My Preferences Accept All Powered by * Solutions 3 2 SECURITY STRATEGIES * Effective Security * Splunk Logging * Purple Team Culture * Vulnerable ≠ Exploitable WHO USES NODEZERO? * ITOps and SecOps * Security Teams * Pentesters THE NODEZERO™ PLATFORM * Internal Pentesting * External Pentesting * Kubernetes Pentesting * Cloud Pentesting * Rapid Response * AD Password Audit * Phishing Impact Testing * NodeZero Tripwires * Documentation NODEZERO FOR COMPLIANCE * PCI Compliance * NIS 2 Compliance Schedule a Demo Start a Free Trial USE CASES * Education * Healthcare * Manufacturing * Supply Chain * Public Sector * Large Organizations * MSSPs and MSPs * Partners 3 2 NODEZERO FOR MSSPS AND MSPS Let Us Be Your Force Multiplier NODEZERO FOR PARTNERS Disruptive Technology That Will Help Drive Revenue PARTNER PORTAL Become a Partner * Resources 3 2 INDUSTRY INSIGHTS ATTACK RESEARCH RESOURCE CENTER * Blogs * Glossary * 2023 Year in Review CUSTOMER STORIES CENTURY-LONG INNOVATION: A LEGACY OF OUTPACING CYBER THREATS Sep 19, 2024 Discover how Komori, a century-old printing giant, is leading the charge in cybersecurity innovation by adapting to internet-connected risks and utilizing advanced solutions like NodeZero to safeguard their legacy. FUTURE-PROOFING CITIES: LYT’S STORY Jul 19, 2024 As cities expand with smart technologies to enhance infrastructure, robust cybersecurity is crucial. Discover how continuous assessments with NodeZero keep urban operations safe and efficient. INDUSTRY INSIGHTS WHY YOU NEED NODEZERO™ KUBERNETES PENTESTING TO SECURE YOUR CONTAINERS Nov 15, 2024 Secure your Kubernetes clusters with NodeZero’s autonomous pentesting – proactive, continuous testing to identify vulnerabilities before attackers do. MAXIMIZING OFFENSIVE SECURITY: ADDRESSING SHORTCOMING AND IMPROVING EFFECTIVENESS Nov 14, 2024 Explore offensive security gaps and solutions with Horizon3.ai’s Phillip Wylie. Learn strategies to enhance vulnerability assessments and security impact. REVOLUTIONIZE YOUR SECURITY WITH AUTONOMOUS PENTESTING—JOIN HORIZON3.AI & FORESITE CYBERSECURITY Oct 31, 2024 Listen to Horizon3.ai’s Phil Wylie and Foresite experts to explore the financial and security benefits of autonomous pentesting and continuous validation. ATTACK CONTENT * Credential Attacks * Log4Shell * Ransomware ATTACK PATHS Routes and methods NodeZero used to gain unauthorized access to networks ON-PREM MISCONFIGURATIONS LEAD TO ENTRA TENANT COMPROMISE As enterprises continue to transition on-premises infrastructure and information systems to the cloud, hybrid cloud systems have emerged as a vital solution, balancing the benefits of both environments to optimize performance, scalability, and ease of change on users... ATTACK BLOGS PALO ALTO EXPEDITION: FROM N-DAY TO FULL COMPROMISE Oct 9, 2024 On July 10, 2024, Palo Alto released a security advisory for CVE-2024-5910, a vulnerability which allowed attackers to remotely reset the Expedition application admin credentials. While we had never heard of Expedition application before, it's advertised as: The... CVE-2024-28987: SOLARWINDS WEB HELP DESK HARDCODED CREDENTIAL VULNERABILITY DEEP-DIVE Sep 25, 2024 On August 13, 2024, SolarWinds released a security advisory for Web Help Desk (WHD) that detailed a deserialization remote code execution vulnerability. This vulnerability, CVE-2024-28986, was added to CISA's Known Exploited Vulnerability (KEV) catalog two days later... DISCLOSURES PALO ALTO EXPEDITION: FROM N-DAY TO FULL COMPROMISE On July 10, 2024, Palo Alto released a security advisory for CVE-2024-5910, a vulnerability which allowed attackers to remotely reset the Expedition application admin credentials. While we had never heard of Expedition application before, it's advertised as: The... * Company 3 2 About Events OUR VISION The future of cyber warfare will run at machine speed MEET THE TEAM Team of Motivated “Learn-it-alls” JOIN THE TEAM We’re a remote-first company with teammates clustered around the globe CONTACT US PRESS RELEASES HORIZON3.AI LAUNCHES NODEZERO™ KUBERNETES PENTESTING, EMPOWERING ORGANIZATIONS TO PROTECT CRITICAL INFRASTRUCTURE Nov 12, 2024 Business Wire 11/12/2024 Horizon3.ai, a global leader in autonomous security solutions, proudly announces the release of NodeZero™ Kubernetes Pentesting, a powerful new capability available to all NodeZero users. Designed to deploy directly within Kubernetes clusters,... HORIZON3.AI NAMED TO THE 2025 FORTUNE CYBER 60 FOR THE SECOND CONSECUTIVE YEAR Oct 30, 2024 Business Wire 10/30/2024 Horizon3.ai, a leader in autonomous security solutions, is honored to announce its second consecutive inclusion in the Fortune Cyber 60, presented by Lightspeed. This recognition underscores the company's continued innovation and influence in... KEITH POYSER APPOINTED AS VICE PRESIDENT FOR EMEA AT HORIZON3.AI Sep 25, 2024 Business Wire 09/25/2024 Horizon3.ai, a global leader in autonomous security solutions, today announced the appointment of Keith Poyser as Vice President for EMEA. Poyser brings more than 25 years of experience in driving sales growth, strategy, and business... AWARDS THE CHANNEL CO. STELLAR STARTUPS 2024 PUBLISHER’S CHOICE AUTONOMOUS PENTESTING 2025 FORTUNE CYBER 60 EVENTS Join us at these upcoming cybersecurity events and workshops WEBINAR REPLAYS Unlock expert insights in our cybersecurity webinar series 06 December SCOTTSDALE CYBERSECURITY SUMMIT SCOTTSDALE CYBERSECURITY SUMMIT 7:30 amThe Phoenician 12 December UNCOVER KUBERNETES SECURITY WEAKNESSES WITH NODEZERO™ UNCOVER KUBERNETES SECURITY WEAKNESSES WITH NODEZERO™ 1:00 pmZoom Webinar * Log In * See a Demo * Free Trial a M * Solutions 3 2 SECURITY STRATEGIES * Effective Security * Splunk Logging * Purple Team Culture * Vulnerable ≠ Exploitable WHO USES NODEZERO? * ITOps and SecOps * Security Teams * Pentesters THE NODEZERO™ PLATFORM * Internal Pentesting * External Pentesting * Kubernetes Pentesting * Cloud Pentesting * Rapid Response * AD Password Audit * Phishing Impact Testing * NodeZero Tripwires * Documentation NODEZERO FOR COMPLIANCE * PCI Compliance * NIS 2 Compliance Schedule a Demo Start a Free Trial USE CASES * Education * Healthcare * Manufacturing * Supply Chain * Public Sector * Large Organizations * MSSPs and MSPs * Partners 3 2 NODEZERO FOR MSSPS AND MSPS Let Us Be Your Force Multiplier NODEZERO FOR PARTNERS Disruptive Technology That Will Help Drive Revenue PARTNER PORTAL Become a Partner * Resources 3 2 INDUSTRY INSIGHTS ATTACK RESEARCH RESOURCE CENTER * Blogs * Glossary * 2023 Year in Review CUSTOMER STORIES CENTURY-LONG INNOVATION: A LEGACY OF OUTPACING CYBER THREATS Sep 19, 2024 Discover how Komori, a century-old printing giant, is leading the charge in cybersecurity innovation by adapting to internet-connected risks and utilizing advanced solutions like NodeZero to safeguard their legacy. FUTURE-PROOFING CITIES: LYT’S STORY Jul 19, 2024 As cities expand with smart technologies to enhance infrastructure, robust cybersecurity is crucial. Discover how continuous assessments with NodeZero keep urban operations safe and efficient. INDUSTRY INSIGHTS WHY YOU NEED NODEZERO™ KUBERNETES PENTESTING TO SECURE YOUR CONTAINERS Nov 15, 2024 Secure your Kubernetes clusters with NodeZero’s autonomous pentesting – proactive, continuous testing to identify vulnerabilities before attackers do. MAXIMIZING OFFENSIVE SECURITY: ADDRESSING SHORTCOMING AND IMPROVING EFFECTIVENESS Nov 14, 2024 Explore offensive security gaps and solutions with Horizon3.ai’s Phillip Wylie. Learn strategies to enhance vulnerability assessments and security impact. REVOLUTIONIZE YOUR SECURITY WITH AUTONOMOUS PENTESTING—JOIN HORIZON3.AI & FORESITE CYBERSECURITY Oct 31, 2024 Listen to Horizon3.ai’s Phil Wylie and Foresite experts to explore the financial and security benefits of autonomous pentesting and continuous validation. ATTACK CONTENT * Credential Attacks * Log4Shell * Ransomware ATTACK PATHS Routes and methods NodeZero used to gain unauthorized access to networks ON-PREM MISCONFIGURATIONS LEAD TO ENTRA TENANT COMPROMISE As enterprises continue to transition on-premises infrastructure and information systems to the cloud, hybrid cloud systems have emerged as a vital solution, balancing the benefits of both environments to optimize performance, scalability, and ease of change on users... ATTACK BLOGS PALO ALTO EXPEDITION: FROM N-DAY TO FULL COMPROMISE Oct 9, 2024 On July 10, 2024, Palo Alto released a security advisory for CVE-2024-5910, a vulnerability which allowed attackers to remotely reset the Expedition application admin credentials. While we had never heard of Expedition application before, it's advertised as: The... CVE-2024-28987: SOLARWINDS WEB HELP DESK HARDCODED CREDENTIAL VULNERABILITY DEEP-DIVE Sep 25, 2024 On August 13, 2024, SolarWinds released a security advisory for Web Help Desk (WHD) that detailed a deserialization remote code execution vulnerability. This vulnerability, CVE-2024-28986, was added to CISA's Known Exploited Vulnerability (KEV) catalog two days later... DISCLOSURES PALO ALTO EXPEDITION: FROM N-DAY TO FULL COMPROMISE On July 10, 2024, Palo Alto released a security advisory for CVE-2024-5910, a vulnerability which allowed attackers to remotely reset the Expedition application admin credentials. While we had never heard of Expedition application before, it's advertised as: The... * Company 3 2 About Events OUR VISION The future of cyber warfare will run at machine speed MEET THE TEAM Team of Motivated “Learn-it-alls” JOIN THE TEAM We’re a remote-first company with teammates clustered around the globe CONTACT US PRESS RELEASES HORIZON3.AI LAUNCHES NODEZERO™ KUBERNETES PENTESTING, EMPOWERING ORGANIZATIONS TO PROTECT CRITICAL INFRASTRUCTURE Nov 12, 2024 Business Wire 11/12/2024 Horizon3.ai, a global leader in autonomous security solutions, proudly announces the release of NodeZero™ Kubernetes Pentesting, a powerful new capability available to all NodeZero users. Designed to deploy directly within Kubernetes clusters,... HORIZON3.AI NAMED TO THE 2025 FORTUNE CYBER 60 FOR THE SECOND CONSECUTIVE YEAR Oct 30, 2024 Business Wire 10/30/2024 Horizon3.ai, a leader in autonomous security solutions, is honored to announce its second consecutive inclusion in the Fortune Cyber 60, presented by Lightspeed. This recognition underscores the company's continued innovation and influence in... KEITH POYSER APPOINTED AS VICE PRESIDENT FOR EMEA AT HORIZON3.AI Sep 25, 2024 Business Wire 09/25/2024 Horizon3.ai, a global leader in autonomous security solutions, today announced the appointment of Keith Poyser as Vice President for EMEA. Poyser brings more than 25 years of experience in driving sales growth, strategy, and business... AWARDS THE CHANNEL CO. STELLAR STARTUPS 2024 PUBLISHER’S CHOICE AUTONOMOUS PENTESTING 2025 FORTUNE CYBER 60 EVENTS Join us at these upcoming cybersecurity events and workshops WEBINAR REPLAYS Unlock expert insights in our cybersecurity webinar series 06 December SCOTTSDALE CYBERSECURITY SUMMIT SCOTTSDALE CYBERSECURITY SUMMIT 7:30 amThe Phoenician 12 December UNCOVER KUBERNETES SECURITY WEAKNESSES WITH NODEZERO™ UNCOVER KUBERNETES SECURITY WEAKNESSES WITH NODEZERO™ 1:00 pmZoom Webinar * Log In * See a Demo * Free Trial CVE-2024-8190: INVESTIGATING CISA KEV IVANTI CLOUD SERVICE APPLIANCE COMMAND INJECTION VULNERABILITY by Zach Hanley | Sep 16, 2024 | Attack Blogs, Attack Research On September 10, 2024, Ivanti released a security advisory for a command injection vulnerability for it’s Cloud Service Appliance (CSA) product. Initially, this CVE-2024-8190 seemed uninteresting to us given that Ivanti stated that it was an authenticated vulnerability. Shortly after on September 13, 2024, the vulnerability was added to CISA’s Known Exploited Vulnerabilities (KEV). Given it was now exploited in the wild we decided to take a look. The advisory reads: > Ivanti has released a security update for Ivanti CSA 4.6 which addresses a > high severity vulnerability. Successful exploitation could lead to > unauthorized access to the device running the CSA. Dual-homed CSA > configurations with ETH-0 as an internal network, as recommended by Ivanti, > are at a significantly reduced risk of exploitation. > > An OS command injection vulnerability in Ivanti Cloud Services Appliance > versions 4.6 Patch 518 and before allows a remote authenticated attacker to > obtain remote code execution. The attacker must have admin level privileges to > exploit this vulnerability. The description definitely sounds like it may have the opportunity for accidental exposure given the details around misconfigurations of the external versus internal interfaces. CRACKING IT OPEN Inspecting the patches, we find that the Cloud Service Appliance has a PHP frontend and the patch simply copies in newer PHP files. Figure 1. Patch introduces more updated php files Inspecting the 4 new PHP files, we land on DateTimeTab.php which has more interesting changes related to validation of the zone variable right before a call to exec(). Figure 2. Validating the zone variable Now that we have a function of interest we trace execution to it. We find that handleDateTimeSubmit() calls our vulnerable function on line 153. Figure 3. handleDateTimeSubmit parses HTTP requests We see that the function takes the request argument TIMEZONE and passes it directly to the vulnerable function, which previously had no input validation before calling exec with our input formatted to a string. DEVELOPING THE EXPLOIT We find that the PHP endpoint /datetime.php maps to the handleDateTimeSubmit() function, and is accessible only from the “internal” interface with authentication. Putting together the pieces, we’re able to achieve command injection by supplying the application username and password. Our proof of concept can be found here. Figure 4. Authenticated Command Injection N-DAY RESEARCH – ALSO KNOWN AS CVSS QUALITY ASSURANCE It seems that Ivanti is correct in marking that this is an authenticated vulnerability. But lets take a look at their configuration guidance to understand what may have went wrong for some of their clients being exploited in the wild. Ivanti’s guidance about ensuring that eth0 is configured as the internal network interface tracks with what we’ve found. When attempting to reach the administrative portal from eth1, we find that we receive a 403 Forbidden instead of a 401 Unauthorized. Figure 5. 403 from the external interface Users that accidentally swap the interfaces, or simply only have one interface configured, would expose the console to the internet. If exposed to the internet, we found that there was no form of rate limiting in attempting username and password combinations. While the appliance does ship with a default credential of admin:admin, this credential is force updated to stronger user-supplied password upon first login. Figure 6. Password policy We theorize that most likely users who have been exploited have never logged in to the appliance, or due to lack of rate limiting may have had poor password hygiene and had weaker passwords. INDICATORS OF COMPROMISE We found sparse logs, but in /var/log/messages we found that an incorrect login looked like the following messages – specifically key in on “User admin does not authenticate”. Figure 7. Failed logon When authentication is successful it looked like – where a successful request has a 200 successful after it. Figure 8. Successful login HOW CAN NODEZERO HELP YOU? Let our experts walk you through a demonstration of NodeZero, so you can see how to put it to work for your company. Schedule a Demo Contact Us info@horizon3.ai press@horizon3.ai 650-445-4457 FOLLOW US SUBSCRIBE TO COMMUNITY UPDATES © 2022 All Rights Reserved. | Privacy Policy | Support Policy | Terms of Service