Ivanti Zero-Day Exploits: Urgent Patching Required

Ivanti has disclosed two zero-day vulnerabilities in its Connect Secure and Policy Secure products that are being exploited in the wild, allowing remote attackers to execute arbitrary commands on targeted gateways. The vulnerabilities, reported by Mandiant and Volexity, include an authentication bypass and a command injection flaw. Patches are scheduled for release, but until then, customers can mitigate the zero-days using provided files. The company has confirmed that the zero-days have been exploited in attacks targeting a small number of customers and advises all customers to run an external integrity checker. Additionally, previous instances of zero-day exploits in Ivanti's products have been reported, highlighting the ongoing security challenges faced by the company.
- Ivanti warns of Connect Secure zero-days exploited in attacks BleepingComputer
- Actively exploited 0-days in Ivanti VPN are letting hackers backdoor networks Ars Technica
- Chinese Hackers Exploit Zero-Day Flaws in Ivanti Connect Secure and Policy Secure The Hacker News
- Two Ivanti Zero-Days Actively Exploited in the Wild Infosecurity Magazine
- Ivanti customers urged to patch vulnerabilities allegedly exploited by Chinese state hackers The Record from Recorded Future News
Reading Insights
0
0
2 min
vs 3 min read
78%
508 → 112 words
Want the full story? Read the original article
Read on BleepingComputer