Security News > 2024 > April > Ivanti fixes VPN gateway vulnerability allowing RCE, DoS attacks
![Ivanti fixes VPN gateway vulnerability allowing RCE, DoS attacks](/static/build/img/news/ivanti-fixes-vpn-gateway-vulnerability-allowing-rce-dos-attacks-medium.jpg)
While Ivanti said the remote code execution risks are limited to "Certain conditions," the company didn't provide details on the vulnerable configurations.
"We are not aware of any customers being exploited by these vulnerabilities at the time of disclosure," Ivanti added.
Shodan, a search engine used to discover Internet-exposed services and devices, currently tracks over 29,000 Ivanti Connect Secure VPN gateways exposed online, while threat monitoring platform Shadowserver sees over 18,000.
Nation-state actors have been exploiting multiple vulnerabilities in Ivanti software this year, and thousands of Ivanti Connect Secure and Policy Secure endpoints are still at risk.
In response, the U.S. Cybersecurity and Infrastructure Security Agency issued an emergency directive to federal agencies ordering them to secure their Ivanti systems against attacks using the zero-day flaws.
The directive was later amended to require agencies to disconnect vulnerable Ivanti VPN appliances and rebuild them with patched software before bringing them back online.
News URL
Related news
- Check Point warns customers to patch VPN vulnerability under active exploitation (source)
- VMware fixes critical vCenter RCE vulnerability, patch now (source)
- SolarWinds Serv-U Vulnerability Under Active Attack - Patch Immediately (source)
- Critical RCE Vulnerability Discovered in Ollama AI Infrastructure Tool (source)
- Prompt Injection Flaw in Vanna AI Exposes Databases to RCE Attacks (source)
- New OpenSSH Vulnerability Could Lead to RCE as Root on Linux Systems (source)
- RCE bug in widely used Ghostscript library now exploited in attacks (source)
- Critical vulnerability in the RADIUS protocol leaves networking equipment open to attack (source)
- RADIUS Protocol Vulnerability Exposes Networks to MitM Attacks (source)
- PHP Vulnerability Exploited to Spread Malware and Launch DDoS Attacks (source)