Security News > 2024 > January > Ivanti warns of Connect Secure zero-days exploited in attacks
Ivanti has disclosed two Connect Secure and Policy Secure zero-days exploited in the wild that can let remote attackers execute arbitrary commands on targeted gateways.
Ivanti says the two zero-days have already been exploited in the wild in attacks targeting a small number of customers.
"Based on our analysis, Ivanti has not found any indication that this vulnerability was introduced into our code development process maliciously. Ivanti has no indication that it has been compromised."
Last week, Ivanti said that a critical remote code execution vulnerability in its Endpoint Management software could be abused by unauthenticated attackers to hijack enrolled devices or the core server.
A month later, hackers exploited a third zero-day flaw in Ivanti's Sentry software to bypass API authentication on vulnerable devices.
Ivanti warns critical EPM bug lets hackers hijack enrolled devices.
News URL
Related news
- Ivanti warns of three more CSA zero-days exploited in attacks (source)
- Rackspace monitoring data stolen in ScienceLogic zero-day attack (source)
- Critical Ivanti RCE flaw with public exploit now used in attacks (source)
- Qualcomm patches high-severity zero-day exploited in attacks (source)
- Zero-Day Alert: Three Critical Ivanti CSA Vulnerabilities Actively Exploited (source)
- Ivanti fixes three CSA zero-days exploited in the wild (CVE-2024-9379, CVE-2024-9380, CVE-2024-9381) (source)
- Mozilla fixes Firefox zero-day actively exploited in attacks (source)
- Firefox Zero-Day Under Attack: Update Your Browser Immediately (source)
- CISA Adds ScienceLogic SL1 Vulnerability to Exploited Catalog After Active Zero-Day Attack (source)
- Fortinet warns of new critical FortiManager flaw used in zero-day attacks (source)