Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

CISA Urges Ivanti Flaw Fix

January 22, 2024
Reading Time: 3 mins read
in Alerts

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive, urging federal agencies to address actively exploited zero-day flaws in Ivanti Connect Secure (ICS) and Ivanti Policy Secure (IPS) products. These vulnerabilities, an authentication bypass (CVE-2023-46805) and a code injection bug (CVE-2024-21887), have become targets for multiple threat actors, allowing them to craft malicious requests and execute arbitrary commands on compromised systems. CISA emphasizes the urgency of mitigation measures due to a sharp increase in threat actor activity since the vulnerabilities were publicly disclosed on January 11, 2024.

Ivanti, the U.S. company behind the affected products, acknowledges the vulnerabilities and plans to release an update to address the flaws next week. In the meantime, CISA recommends immediate actions, including applying a temporary workaround provided by Ivanti through an XML file to make necessary configuration changes. Organizations using Ivanti products are urged to run an External Integrity Checker Tool to identify signs of compromise, disconnect affected devices from networks if compromise is found, reset devices, and import the XML file. Additionally, Federal Civilian Executive Branch (FCEB) entities are advised to take further steps, such as revoking and reissuing certificates, resetting passwords, and addressing potential API key issues.

Cybersecurity firms Volexity and Mandiant report observing attacks exploiting these flaws to deploy web shells and passive backdoors for persistent access to compromised devices. As many as 2,100 devices worldwide are estimated to have been compromised. The initial attack wave in December 2023 is attributed to a Chinese nation-state group, UTA0178. Mandiant, tracking the activity as UNC5221, notes that it has not been linked to any specific group or country. Threat intelligence firm GreyNoise observes opportunistic exploitation of the vulnerabilities for financial gain, with attackers dropping persistent backdoors and cryptocurrency miners.

Reference:
  • CISA Issues Emergency Directive Requiring Federal Agencies to Mitigate Ivanti Connect Secure and Policy Secure Vulnerabilities
Tags: CISACVECyber AlertCyber Alerts 2024Cyber RiskCyber threatCybersecurityFebruary 2024IvantiVulnerabilities
ADVERTISEMENT

Related Posts

Interlock Ransomware Threat Alert

Interlock Ransomware Threat Alert

July 24, 2025
Interlock Ransomware Threat Alert

Backdoor Found in WP Plugins

July 24, 2025
Interlock Ransomware Threat Alert

GitLab Patches Key Vulnerabilities

July 24, 2025
Lumma Stealer Returns with New Tactics

npm Phishing Emails Target Developer Logins

July 23, 2025
Lumma Stealer Returns with New Tactics

Lumma Stealer Returns with New Tactics

July 23, 2025
Lumma Stealer Returns with New Tactics

MuddyWater Emerges Amid Iran-Israel Clash

July 23, 2025

Latest Alerts

Interlock Ransomware Threat Alert

GitLab Patches Key Vulnerabilities

Backdoor Found in WP Plugins

Lumma Stealer Returns with New Tactics

npm Phishing Emails Target Developer Logins

MuddyWater Emerges Amid Iran-Israel Clash

Subscribe to our newsletter

    Latest Incidents

    Data Breach Affects 340K Jobseekers

    Hackers Use Ransomware on SharePoint Servers

    Beluga Vodka Ransomware Attack Reported

    Weak Password Triggers Ransomware Old Firm

    US Nuclear Agency Breached in MS Hack

    European Healthcare Network Breached

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial