Security News > 2024 > January > Ivanti warns of Connect Secure zero-days exploited in attacks

Ivanti has disclosed two Connect Secure and Policy Secure zero-days exploited in the wild that can let remote attackers execute arbitrary commands on targeted gateways.
Ivanti says the two zero-days have already been exploited in the wild in attacks targeting a small number of customers.
"Based on our analysis, Ivanti has not found any indication that this vulnerability was introduced into our code development process maliciously. Ivanti has no indication that it has been compromised."
Last week, Ivanti said that a critical remote code execution vulnerability in its Endpoint Management software could be abused by unauthenticated attackers to hijack enrolled devices or the core server.
A month later, hackers exploited a third zero-day flaw in Ivanti's Sentry software to bypass API authentication on vulnerable devices.
Ivanti warns critical EPM bug lets hackers hijack enrolled devices.
News URL
Related news
- SonicWall SMA appliances exploited in zero-day attacks (CVE-2025-23006) (source)
- SonicWall warns of SMA1000 RCE flaw exploited in zero-day attacks (source)
- Google fixes Android kernel zero-day exploited in attacks (source)
- 7-Zip MotW bypass exploited in zero-day attacks against Ukraine (source)
- Apple fixes zero-day exploited in 'extremely sophisticated' attacks (source)
- Apple fixes zero-day flaw exploited in “extremely sophisticated” attack (CVE-2025-24200) (source)
- PostgreSQL Vulnerability Exploited Alongside BeyondTrust Zero-Day in Targeted Attacks (source)
- Critical PostgreSQL bug tied to zero-day attack on US Treasury (source)
- Microsoft fixes Power Pages zero-day bug exploited in attacks (source)
- Broadcom fixes three VMware zero-days exploited in attacks (source)