Skip to content

Commit

Permalink
Merge pull request #868 from DIVD-NL/sT0wn-nl-patch-1
Browse files Browse the repository at this point in the history
Create DIVD-2024-00046.md
  • Loading branch information
MrSeccubus authored Nov 12, 2024
2 parents 4ba74d2 + 20f41ed commit b7ee9c6
Showing 1 changed file with 54 additions and 0 deletions.
54 changes: 54 additions & 0 deletions _cases/2024/DIVD-2024-00046.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,54 @@
---
layout: case
title: "Multiple critical vulnerablilties in Ivanti Cloud Services Appliance (CSA)"
author: Alwin Warringa
lead: Alwin Warringa
excerpt: "Ivanti CSA is affected by two critical vulnerabilities, allowing a remote unauthenticated attacker bypass admin authentication and execute arbitrary commands on the appliance."
researchers:
- Alwin Warringa
- Wessel Baltus
cves:
- CVE-2024-8963
- CVE-2024-8190
product:
- Ivanti Cloud Services Appliance (CSA)
versions:
- Ivanti CSA before 4.6 Patch 519
recommendation: "Upgrade the Ivanti CSA 4.6 to CSA 5.0"
workaround: "none"
patch_status: Patch available
status : Open
start: 2024-09-24
timeline:
- start: 2024-09-24
end:
event: "DIVD starts researching the vulnerability."
- start: 2024-11-11
end:
event: "DIVD finds fingerprint, preparing to scan."
- start: 2024-11-11
end:
event: "Case opened and starting first scan."
- start: 2024-11-12
end:
event: "Mails sent out."
---

## Summary
Ivanti has disclosed a critical vulnerability in Ivanti CSA 4.6 which was incidentally addressed in the patch released on 10 September (CSA 4.6 Patch 519). Successful exploitation could allow a remote unauthenticated attacker to access restricted functionality. If {% cve CVE-2024-8963 %} is used in conjunction with {% cve CVE-2024-8190 %} an attacker can bypass admin authentication and execute arbitrary commands on the appliance.

## Recommendations

To remediate {% cve CVE-2024-8963 %} and {% cve CVE-2024-8190 %}, update to version 5.0. You can find a link to the Ivanti CSA bulletin at the bottom of this post.

## What we are doing

DIVD is currently working to identify parties that are running a vulnerable version of Ivanti CSA and to notify these parties.

{% include timeline.html %}

## More information

* {% cve CVE-2024-8963 %}
* {% cve CVE-2024-8190 %}
* [Ivanti CSA Security Bulletin](https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-4-6-Cloud-Services-Appliance-CVE-2024-8963?language=en_US)

0 comments on commit b7ee9c6

Please sign in to comment.