Security News > 2024 > April > Ivanti fixes VPN gateway vulnerability allowing RCE, DoS attacks
While Ivanti said the remote code execution risks are limited to "Certain conditions," the company didn't provide details on the vulnerable configurations.
"We are not aware of any customers being exploited by these vulnerabilities at the time of disclosure," Ivanti added.
Shodan, a search engine used to discover Internet-exposed services and devices, currently tracks over 29,000 Ivanti Connect Secure VPN gateways exposed online, while threat monitoring platform Shadowserver sees over 18,000.
Nation-state actors have been exploiting multiple vulnerabilities in Ivanti software this year, and thousands of Ivanti Connect Secure and Policy Secure endpoints are still at risk.
In response, the U.S. Cybersecurity and Infrastructure Security Agency issued an emergency directive to federal agencies ordering them to secure their Ivanti systems against attacks using the zero-day flaws.
The directive was later amended to require agencies to disconnect vulnerable Ivanti VPN appliances and rebuild them with patched software before bringing them back online.
News URL
Related news
- New Ivanti RCE flaw may impact 16,000 exposed VPN gateways (source)
- Ivanti fixes RCE vulnerability reported by NATO cybersecurity researchers (CVE-2023-41724) (source)
- Ivanti Releases Urgent Fix for Critical Sentry RCE Vulnerability (source)
- Week in review: Ivanti fixes RCE vulnerability, Nissan breach affects 100,000 individuals (source)
- New HTTP/2 Vulnerability Exposes Web Servers to DoS Attacks (source)
- Fortra Patches Critical RCE Vulnerability in FileCatalyst Transfer Tool (source)
- New 'Loop DoS' Attack Impacts Hundreds of Thousands of Systems (source)
- New ‘Loop DoS’ attack may impact up to 300,000 online systems (source)
- Exploit released for Fortinet RCE bug used in attacks, patch now (source)
- Some 300,000 IPs vulnerable to this Loop DoS attack (source)