Security

Patches

Three more vulns spotted in Ivanti CSA, all critical, one 10/10

Patch up, everyone – that admin portal is mighty attractive to your friendly cyberattacker


Ivanti just put out a security advisory warning of three critical vulnerabilities in its Cloud Services Application (CSA), including a perfect 10.

CSA is a tempting target for cyberattacks because of its central role in accessing internal organizational data and managing IT systems. If a criminal can compromise it, they may be able to intercept or manipulate confidential information, or potentially compromise other parts of the network.

Tracked as CVE-2024-11639, the headline vulnerability is an authentication bypass flaw in the admin web console, allowing unauthenticated users to grant themselves administrative privileges. It carries the maximum 10 CVSS rating.

Following close behind is a pair of 9.1 severity bugs, which are also grouped under the most severe "critical" category.

CVE-2024-11772 is a command injection flaw in Ivanti CSA's admin web console that allows for remote code execution if the attacker has admin privileges. The two vulnerabilities make an attractive prospect for attackers to chain together and cause damage.

Ivanti CSA's admin web console component is again the source of the third flaw, CVE-2024-11773 – an SQL injection vulnerability allowing admin users to run arbitrary SQL statements.

All three issues affect Ivanti CSA versions 5.0.2 and earlier. Customers are encouraged to upgrade to 5.0.3 to address them all.

"We are not aware of any customers being exploited by these vulnerabilities prior to public disclosure," the vendor said in its advisory, adding that CrowdStrike's Advanced Research Team found and reported the issues to Ivanti via its responsible disclosure program.

Given the lack of exploitation information, Ivanti went on to say that it did not have any indicators of compromise (IOCs) to offer customers.

It's not the first time this year the admin web console of Ivanti's CSA has caught the attention of security pros. The US Cybersecurity and Infrastructure Security Agency (CISA) ordered federal civilian executive branch agencies to patch a number of vulnerabilities that were known to be chained in active attacks.

CISA added CVE-2024-9379 and CVE-2024-9380, SQL injection and OS command injection bugs respectively, to its KEV catalog in October. The two were being chained with CVE-2024-8963, a critical (9.4) directory traversal vulnerability used to access restricted functionality.

CISA also noted that if CVE-2024-8963 was chained with CVE-2024-8190, a different OS command injection bug in CSA disclosed in September, then it could allow an attacker to bypass admin authentication and pass commands to the OS. ®

Send us news
2 Comments

UK ICO not happy with Google's plans to allow device fingerprinting

Also, Ascension notifies 5.6M victims, Krispy Kreme bandits come forward, LockBit 4.0 released, and more

Apache issues patches for critical Struts 2 RCE bug

More details released after devs allowed weeks to apply fixes

Fully patched Cleo products under renewed 'zero-day-ish' mass attack

Thousands of servers targeted while customers wait for patches

OpenWrt orders router firmware updates after supply chain attack scare

A couple of bugs lead to a potentially bad time

Infosec experts divided on AI's potential to assist red teams

Yes, LLMs can do the heavy lifting. But good luck getting one to give evidence

Trump administration wants to go on cyber offensive against China

The US has never attacked Chinese critical infrastructure before, right?

Deloitte says cyberattack on Rhode Island benefits portal carries 'major security threat'

Personal and financial data probably stolen

Perfect 10 directory traversal vuln hits SailPoint's IAM solution

20-year-old info disclosure class bug still pervades security software

Are your Prometheus servers and exporters secure? Probably not

Plus: Netscaler brute force barrage; BeyondTrust API key stolen; and more

Lights out for 18 more DDoS booters in pre-Christmas Operation PowerOFF push

Holiday cheer comes in the form of three arrests and 27 shuttered domains

Zabbix urges upgrades after critical SQL injection bug disclosure

US agencies blasted 'unforgivable' SQLi flaws earlier this year

US military grounds entire Osprey tiltrotor fleet over safety concerns

Boeing-Bell V-22 can't outfly its checkered past, it seems