- Buy a Microsoft Project Pro or Microsoft Visio Pro license for just $18 with this deal
- How I optimized the cheapest 98-inch TV available to look and sound incredible (and it's $1,000 off)
- The best blood pressure watches of 2024
- Join Costco and get a $20 gift card - here's how
- One of the most immersive soundbars I've tested is refreshingly compact (and $100 off right now)
Five Eyes Warn of Ivanti Vulnerabilities Exploitation
Read more on Ivanti vulnerabilities:
Eight government agencies from the Five Eyes countries (Australia, Canada, New Zealand, the UK, and the US) issued an urgent warning on February 29 about the active exploitation of Ivanti product vulnerabilities.
Specifically, the joint advisory assessed that cyber threat actors are exploiting previously identified vulnerabilities in Ivanti Connect Secure and Ivanti Policy Secure gateways.
The vulnerabilities identified as actively exploited by threat actors are the following:
These vulnerabilities impact all supported versions (9.x and 22.x) of Ivanti gateways.
Their severity ratings range from high to critical. They can be used in a chain of exploits to enable malicious cyber threat actors to bypass authentication, craft malicious requests and execute arbitrary commands with elevated privileges.
These are three of five vulnerabilities discovered in Ivanti’s product since January 2024.
Ivanti Compromise Detection Tools Fail
In their joint advisory, the Five Eyes agencies also note that cyber threat actors can deceive Ivanti’s internal and external Integrity Checker Tool (ICT), resulting in a failure to detect compromise.
“During multiple incident response engagements associated with this activity, CISA identified that Ivanti’s internal and previous external ICT failed to detect compromise.
“In addition, CISA has conducted independent research in a lab environment validating that the Ivanti ICT is not sufficient to detect compromise and that a cyber threat actor may be able to gain root-level persistence despite issuing factory resets,” reads the advisory.
You should listen to CISA
Neither the Ivanti Connect Secure (or Policy Secure Gateway) Integrity Checker Tool (ICT) nor Factory Reset capabilities can be trusted in cases where you think the device might be compromised.
Please think about this for a bit…https://t.co/ml3xwky2Vo pic.twitter.com/YyXZBWfOUq— Will Dormann (@wdormann) February 29, 2024
Five Eyes’ Mitigation Recommendations
The agencies provided a set of actions for all users of Ivanti gateways to take:
- Assume that user and service account credentials stored within the affected Ivanti VPN appliances are likely compromised
- Hunt for malicious activity on their networks using the detection methods and indicators of compromise (IOCs) within this advisory
- Run Ivanti’s most recent external ICT
- Apply available patching guidance provided by Ivanti as version updates become available
- If a potential compromise is detected, collect and analyze logs and artifacts for malicious activity and apply the incident response recommendations within this advisory
“The authoring organizations strongly urge all organizations to consider the significant risk of adversary access to, and persistence on, Ivanti Connect Secure and Ivanti Policy Secure gateways when determining whether to continue operating these devices in an enterprise environment,” the document insisted.
The joint advisory was issued by the FBI, the US Cybersecurity and Infrastructure Security Agency (CISA), the UK National Cyber Security Centre (NCSC-UK), the Canadian Centre for Cyber Security (Cyber Centre), the Australian Cyber Security Centre (ACSC), the New Zealand National Cyber Security Centre (NCSC-NZ), the CERT-New Zealand (CERT NZ) and the Multi-State Information Sharing & Analysis Center (MS-ISAC).
These agencies received the support of Volexity, Ivanti, Mandiant and other industry partners.