Special Features

Cybersecurity Month

CISA adds fresh Ivanti vuln, critical Fortinet bug to hall of shame

Usual three-week window to address significant risks to federal agencies applies


The US Cybersecurity and Infrastructure Security Agency (CISA) says vulnerabilities in Fortinet and Ivanti products are now being exploited, earning them places in its Known Exploited Vulnerabilities (KEV) catalog.

It comes as the latest blow to the security shops, which haven't had the best year in terms of vulnerabilities.

The vulnerability affecting multiple Fortinet products was first disclosed back in February during what came to be known as a week to forget for the company.

Despite carrying a critical (9.8) severity rating, it flew somewhat under the radar due to other critical bugs such as CVE-24-21762 being actively exploited at the time.

Tracked as CVE-2024-23113, the format string vulnerability affects the FortiOS fgfmd daemon and allows remote attackers to execute code and commands via specially crafted packets.

It affects an array of products – FortiOS, FortiPAM, FortiProxy, and FortiWeb – and different versions therein.

As ever, applying the relevant patches is recommended, but if for whatever reason that can't be done right away, Fortinet said a workaround can be implemented as a temporary measure.

It requires admins to remove the fgfm access for every vulnerable interface. While this will prevent FortiManager from discovering FortiGate devices, connections will still be possible from FortiGate.

"Please also note that a local-in policy that only allows fgfm connections from a specific IP will reduce the attack surface but it won't prevent the vulnerability from being exploited from this IP," the advisory reads. "As a consequence, this should be used as a mitigation and not as a complete workaround."

Every entry on CISA's KEV list helpfully carries information about whether the vulnerability is known to be used in ransomware attacks. The value is set to "unknown" in this case, which of course is better than a yes, but shouldn't serve as a reason to delay fixing the nine-month-old bug.

Ivanti's turn

Ivanti's start to the year was equally if not more tumultuous than Fortinet's. A patching mishap related to multiple Connect Secure vulnerabilities led to its secure-by-design overhaul commitment in April.

The vulnerabilities recently added to CISA's KEV list are new, however, rather than relating to the earlier issues, and affect Ivanti Cloud Services Application (CSA), which facilitates secure remote connections to resources.

The first is CVE-2024-9379 – an SQL injection vulnerability in the CSA admin web console carrying a 6.5 (medium) severity rating. It allows attackers with admin privileges to run SQL statements or execute code and affects CSA versions before 5.0.2, which of course includes version 4.6 – an end-of-life release that received its last update in September.

Ivanti CSA's admin web console is also the source of the second vulnerability that's now known to be exploited. CVE-2024-9380 is an OS command injection bug that has a slightly higher 7.2 (high) severity rating and can also lead to code execution.

The vendor said it was made aware that some customers running the EOL version 4.6 were being attacked with these two vulnerabilities chained with CVE-2024-8963 – a 9.4 (critical) path traversal bug leading to restricted functionality being accessed.

Although the two vulnerabilities affect CSA 5.0, no exploits have been observed in appliances running this version.

"It is important for customers to know, CVE-2024-8963 was incidentally addressed in previous versions of CSA 5.0 with the removal of unnecessary code," said Ivanti in its advisory

"The vulnerabilities disclosed were discovered during our investigation into the exploitation of CVE-2024-8963 and CVE-2024-8190 in CSA 4.6 and found to be present, although not exploited, in CSA 5.0."

Curiously, Ivanti also noted that a separate path traversal vulnerability, CVE-2024-9381, was also being exploited while being chained with CVE-2024-8963, but it wasn't added to CISA's KEV catalog.

"Ivanti recommends reviewing the CSA for modified or newly added administrative users," the advisory went on to say. "While inconsistent, some attempts may show up in the broker logs which are local to the system. We also recommend reviewing EDR alerts, if you have installed EDR or other security tools on your CSA. As this is an edge device, Ivanti strongly recommends using a layered approach to security and installing an EDR tool on the CSA.

"If you suspect compromise, Ivanti's recommendation is that you rebuild your CSA with version 5.0.2." ®

Send us news
Post a comment

Three more vulns spotted in Ivanti CSA, all critical, one 10/10

Patch up, everyone – that admin portal is mighty attractive to your friendly cyberattacker

UK ICO not happy with Google's plans to allow device fingerprinting

Also, Ascension notifies 5.6M victims, Krispy Kreme bandits come forward, LockBit 4.0 released, and more

Fully patched Cleo products under renewed 'zero-day-ish' mass attack

Thousands of servers targeted while customers wait for patches

Apache issues patches for critical Struts 2 RCE bug

More details released after devs allowed weeks to apply fixes

Deloitte says cyberattack on Rhode Island benefits portal carries 'major security threat'

Personal and financial data probably stolen

Are your Prometheus servers and exporters secure? Probably not

Plus: Netscaler brute force barrage; BeyondTrust API key stolen; and more

What do ransomware and Jesus have in common? A birth month and an unwillingness to die

35 years since AIDS first borked a PC and we're still no closer to a solution

Lights out for 18 more DDoS booters in pre-Christmas Operation PowerOFF push

Holiday cheer comes in the form of three arrests and 27 shuttered domains

Critical security hole in Apache Struts under exploit

You applied the patch that could stop possible RCE attacks last week, right?

Ransomware scum blow holes in Cleo software patches, Cl0p (sort of) claims responsibility

But can you really take crims at their word?

How Androxgh0st rose from Mozi's ashes to become 'most prevalent malware'

Botnet's operators 'driven by similar interests as that of the Chinese state'

Suspected LockBit dev, facing US extradition, 'did it for the money'

Dual Russian-Israeli national arrested in August