Ivanti VPN Zero-Day Exploits: State-Sponsored Hackers at Work

1 min read
Source: Ars Technica
Ivanti VPN Zero-Day Exploits: State-Sponsored Hackers at Work
Photo: Ars Technica
TL;DR Summary

Hackers are actively exploiting two critical zero-day vulnerabilities in Ivanti Connect Secure, a widely used VPN appliance, to bypass two-factor authentication and execute malicious code inside networks. The vulnerabilities, tracked as CVE-2023-46805 and CVE-2024-21887, allow attackers to run commands on the system, steal configuration data, modify files, and gain unfettered access to systems on the network. The attacks are attributed to a threat actor suspected to be a Chinese nation-state-level actor, and there are approximately 15,000 affected Ivanti appliances exposed to the Internet. Organizations using Ivanti Connect Secure are urged to take immediate action to mitigate the vulnerabilities.

Share this article

Reading Insights

Total Reads

0

Unique Readers

1

Time Saved

3 min

vs 4 min read

Condensed

85%

65898 words

Want the full story? Read the original article

Read on Ars Technica