Security News > 2024 > January > Ivanti warns of Connect Secure zero-days exploited in attacks
Ivanti has disclosed two Connect Secure and Policy Secure zero-days exploited in the wild that can let remote attackers execute arbitrary commands on targeted gateways.
Ivanti says the two zero-days have already been exploited in the wild in attacks targeting a small number of customers.
"Based on our analysis, Ivanti has not found any indication that this vulnerability was introduced into our code development process maliciously. Ivanti has no indication that it has been compromised."
Last week, Ivanti said that a critical remote code execution vulnerability in its Endpoint Management software could be abused by unauthenticated attackers to hijack enrolled devices or the core server.
A month later, hackers exploited a third zero-day flaw in Ivanti's Sentry software to bypass API authentication on vulnerable devices.
Ivanti warns critical EPM bug lets hackers hijack enrolled devices.
News URL
Related news
- Google fixes fifth Chrome zero-day exploited in attacks this year (source)
- Apple backports fix for zero-day exploited in attacks to older iPhones (source)
- Microsoft fixes Windows zero-day exploited in QakBot malware attacks (source)
- Check Point releases emergency fix for VPN zero-day exploited in attacks (source)
- Check Point Warns of Zero-Day Attacks on its VPN Gateway Products (source)
- Check Point VPN zero-day exploited in attacks since April 30 (source)
- Black Basta ransomware gang linked to Windows zero-day attacks (source)