"Ivanti Zero-Day Vulnerabilities Spark Security Concerns"

TL;DR Summary
Ivanti has disclosed two new high-severity zero-day flaws in its Connect Secure and Policy Secure products, with one already being actively exploited. The vulnerabilities include a privilege escalation flaw and a server-side request forgery issue. Ivanti has released fixes for the affected versions and recommends customers to factory reset their appliance before applying the patch. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an advisory warning about adversaries leveraging these flaws to capture credentials and compromise enterprise networks.
- Alert: Ivanti Discloses 2 New Zero-Day Flaws, One Under Active Exploitation The Hacker News
- CISA: Attackers Are Bypassing Ivanti VPN Bug Mitigations CRN
- Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation Mandiant
- Ivanti Zero-Day Patches Delayed as 'KrustyLoader' Attacks Mount - Ivanti Zero-Day Patches Delayed as 'KrustyLoader' Attacks Mount DARKReading
- Ivanti Struggling to Hit Zero-Day Patch Release Schedule SecurityWeek
Reading Insights
Total Reads
0
Unique Readers
0
Time Saved
2 min
vs 2 min read
Condensed
80%
395 → 80 words
Want the full story? Read the original article
Read on The Hacker News