Lorem ipsum dolor sit amet, consectetur adipiscing elit. Test link

Ivanti Warns of Active Exploitation of Newly Patched Cloud Appliance Vulnerability

Ivanti has reported that a freshly fixed security weakness in its Cloud Service Appliance (CSA) has come under active exploitation in the wild.

The high-severity vulnerability in question is CVE-2024-8190 (CVSS score: 7.2), which permits remote code execution under certain situations.

"An OS command injection vulnerability in Ivanti Cloud Services Appliance versions 4.6 Patch 518 and before allows a remote authenticated attacker to obtain remote code execution," Ivanti highlighted in an advisory posted earlier this week. "The attacker must have admin level privileges to exploit this vulnerability."

The issue effects Ivanti CSA 4.6, which has now achieved end-of-life status, mandating that clients switch to a supported version going forward. That noted, it has been addressed in CSA 4.6 Patch 519.

"With the end-of-life status this is the last fix that Ivanti will backport for this version," the Utah-based IT software business stated. "Customers must upgrade to Ivanti CSA 5.0 for continued support."

"CSA 5.0 is the only supported version and does not include this vulnerability. Customers currently operating Ivanti CSA 5.0 do not need to take any extra action."

On Friday, Ivanti updated their advice to say that it witnessed proven exploitation of the problem in the wild targeting a "limited number of customers."

It did not divulge more data linked to the assaults or the identities of the threat actors weaponizing it, but, a number of other vulnerabilities in Ivanti products have been exploited as a zero-day by China-nexus cyberespionage organizations.

The finding has caused the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to add the weakness to its Known Exploited Vulnerabilities (KEV) database, forcing government entities to deploy the remedies by October 4, 2024.

The revelation also comes as cybersecurity startup Horizon3.ai presented a comprehensive technical investigation of a significant deserialization vulnerability (CVE-2024-29847, CVSS score: 10.0) affecting Endpoint Manager (EPM) that results in remote code execution.

Cookie Consent
We serve cookies on this site to analyze traffic, remember your preferences, and optimize your experience.
Oops!
It seems there is something wrong with your internet connection. Please connect to the internet and start browsing again.
AdBlock Detected!
We have detected that you are using adblocking plugin in your browser.
The revenue we earn by the advertisements is used to manage this website, we request you to whitelist our website in your adblocking plugin.
Site is Blocked
Sorry! This site is not available in your country.