Ivanti VPN Zero-Day Exploits: State-Sponsored Hackers at Work

Hackers are actively exploiting two critical zero-day vulnerabilities in Ivanti Connect Secure, a widely used VPN appliance, to bypass two-factor authentication and execute malicious code inside networks. The vulnerabilities, tracked as CVE-2023-46805 and CVE-2024-21887, allow attackers to run commands on the system, steal configuration data, modify files, and gain unfettered access to systems on the network. The attacks are attributed to a threat actor suspected to be a Chinese nation-state-level actor, and there are approximately 15,000 affected Ivanti appliances exposed to the Internet. Organizations using Ivanti Connect Secure are urged to take immediate action to mitigate the vulnerabilities.
- Actively exploited 0-days in Ivanti VPN are letting hackers backdoor networks Ars Technica
- Ivanti warns of Connect Secure zero-days exploited in attacks BleepingComputer
- State-backed hackers are exploiting new Ivanti VPN zero-days — but no patches yet TechCrunch
- Infoseccers think attackers backed by China are behind Ivanti zero-day exploits The Register
- State-Sponsored Hackers Exploit Zero-Day Flaws in Ivanti VPN PCMag
Reading Insights
0
1
3 min
vs 4 min read
85%
658 → 98 words
Want the full story? Read the original article
Read on Ars Technica