Ivanti has released safety updates to deal with a number of safety flaws impacting Join Safe (ICS), Coverage Safe (IPS), and Cloud Companies Software (CSA) that might be exploited to realize arbitrary code execution.
The listing of vulnerabilities is under –
- CVE-2024-38657 (CVSS rating: 9.1) – Exterior management of a file identify in Ivanti Join Safe earlier than model 22.7R2.4 and Ivanti Coverage Safe earlier than model 22.7R1.3 permits a distant authenticated attacker with admin privileges to jot down arbitrary information
- CVE-2025-22467 (CVSS rating: 9.9) – A stack-based buffer overflow in Ivanti Join Safe earlier than model 22.7R2.6 permits a distant authenticated attacker to realize distant code execution
- CVE-2024-10644 (CVSS rating: 9.1) – Code injection in Ivanti Join Safe earlier than model 22.7R2.4 and Ivanti Coverage Safe earlier than model 22.7R1.3 permits a distant authenticated attacker with admin privileges to realize distant code execution
- CVE-2024-47908 (CVSS rating: 9.1) – Working system command injection within the admin net console of Ivanti CSA earlier than model 5.0.5 permits a distant authenticated attacker with admin privileges to realize distant code execution
The shortcomings have been addressed within the under variations –
- Ivanti Join Safe 22.7R2.6
- Ivanti Coverage Safe 22.7R1.3
- Ivanti CSA 5.0.5
The corporate mentioned it isn’t conscious of any of the issues being exploited within the wild. Nonetheless, with Ivanti home equipment being repeatedly weaponized by malicious actors, it is crucial that customers take steps to use the newest patches.
Ivanti additionally acknowledged that its edge merchandise have been “focused and exploited by refined menace actor assaults” and that it is making efforts to enhance its software program, implement secure-by-design rules, and lift the bar for potential abuse by adversaries.
“Whereas these merchandise aren’t the final word goal, they’re more and more the route that well-resourced nation state teams are focusing their effort on to aim espionage campaigns towards extraordinarily high-value organizations,” Ivanti CSO Daniel Spicer said.
“We have now enhanced inside scanning, guide exploitation and testing capabilities, elevated collaboration and data sharing with the safety ecosystem, and additional enhanced our accountable disclosure course of, together with turning into a CVE Numbering Authority.”
The event comes as Bishop Fox released full technical particulars of a now-patched safety flaw in SonicWall SonicOS (CVE-2024-53704) that might be exploited to bypass authentication in firewalls and permit attackers to hijack lively SSL VPN classes to be able to acquire unauthorized entry.
As of February 7, 2025, almost 4,500 internet-facing SonicWall SSL VPN servers stay unpatched towards CVE-2024-53704.
In the same transfer, Akamai has published its discovery of two vulnerabilities in Fortinet FortiOS (CVE-2024-46666 and CVE-2024-46668) that an unauthenticated attacker can exploit to realize denial-of-service (DoS) and distant code execution. The failings have been resolved by Fortinet on January 14, 2025.
Fortinet has since additionally revised its advisory for CVE-2024-55591 to focus on one other flaw tracked as CVE-2025-24472 (CVSS rating: 8.1) that might lead to an authentication bypass in FortiOS and FortiProxy units by way of a specifically crafted CSF proxy request.
The corporate credited watchTowr Labs researcher Sonny Macdonald for locating and reporting the flaw. It is price noting that the vulnerability has already been patched alongside CVE-2024-55591, that means no buyer motion is required if fixes for the latter have already been utilized.
Source link