Security

Patches

Three more vulns spotted in Ivanti CSA, all critical, one 10/10

Patch up, everyone – that admin portal is mighty attractive to your friendly cyberattacker


Ivanti just put out a security advisory warning of three critical vulnerabilities in its Cloud Services Application (CSA), including a perfect 10.

CSA is a tempting target for cyberattacks because of its central role in accessing internal organizational data and managing IT systems. If a criminal can compromise it, they may be able to intercept or manipulate confidential information, or potentially compromise other parts of the network.

Tracked as CVE-2024-11639, the headline vulnerability is an authentication bypass flaw in the admin web console, allowing unauthenticated users to grant themselves administrative privileges. It carries the maximum 10 CVSS rating.

Following close behind is a pair of 9.1 severity bugs, which are also grouped under the most severe "critical" category.

CVE-2024-11772 is a command injection flaw in Ivanti CSA's admin web console that allows for remote code execution if the attacker has admin privileges. The two vulnerabilities make an attractive prospect for attackers to chain together and cause damage.

Ivanti CSA's admin web console component is again the source of the third flaw, CVE-2024-11773 – an SQL injection vulnerability allowing admin users to run arbitrary SQL statements.

All three issues affect Ivanti CSA versions 5.0.2 and earlier. Customers are encouraged to upgrade to 5.0.3 to address them all.

"We are not aware of any customers being exploited by these vulnerabilities prior to public disclosure," the vendor said in its advisory, adding that CrowdStrike's Advanced Research Team found and reported the issues to Ivanti via its responsible disclosure program.

Given the lack of exploitation information, Ivanti went on to say that it did not have any indicators of compromise (IOCs) to offer customers.

It's not the first time this year the admin web console of Ivanti's CSA has caught the attention of security pros. The US Cybersecurity and Infrastructure Security Agency (CISA) ordered federal civilian executive branch agencies to patch a number of vulnerabilities that were known to be chained in active attacks.

CISA added CVE-2024-9379 and CVE-2024-9380, SQL injection and OS command injection bugs respectively, to its KEV catalog in October. The two were being chained with CVE-2024-8963, a critical (9.4) directory traversal vulnerability used to access restricted functionality.

CISA also noted that if CVE-2024-8963 was chained with CVE-2024-8190, a different OS command injection bug in CSA disclosed in September, then it could allow an attacker to bypass admin authentication and pass commands to the OS. ®

Send us news
2 Comments

Zero-day exploits plague Ivanti Connect Secure appliances for second year running

Factory resets and apply patches is the advice amid fortnight delay for other appliances

Nominet probes network intrusion linked to Ivanti zero-day exploit

Unauthorized activity detected, but no backdoors found

Cryptojacking, backdoors abound as fiends abuse Aviatrix Controller bug

This is what happens when you publish PoCs immediately, hm?

MediaTek rings in the new year with a parade of chipset vulns

Manufacturers should have had ample time to apply the fixes

I tried hard, but didn't fix all of cybersecurity, admits outgoing US National Cyber Director

In colossal surprise, ONCD boss Harry Coker says more work is needed

Miscreants 'mass exploited' Fortinet firewalls, 'highly probable' zero-day used

Ransomware 'not off the table,' Arctic Wolf threat hunter tells El Reg

DEF CON's hacker-in-chief faces fortune in medical bills after paralyzing neck injury

Marc Rogers is 'lucky to be alive'

Datacus extractus: Harry Potter publisher breached without resorting to magic

PLUS: Allstate sued for allegedly tracking drivers; Dutch DDoS; More fake jobs from Pyongyang; and more

Six vulnerabilities in ubiquitous rsync tool announced and fixed in a day

Turns out tool does both file transfers and security fixes fast

Infoseccer: Private security biz let guard down, exposed 120K+ files

Assist Security’s client list includes fashion icons, critical infrastructure orgs

Snyk appears to deploy 'malicious' packages targeting Cursor for unknown reason

Packages removed, vendor said to have apologized to AI code editor as onlookers say it could have been a test

Europe coughs up €400 to punter after breaking its own GDPR data protection rules

PLUS: Data broker leak reveals extent of info trading; Hot new ransomware gang might be all AI, no bark; and more