Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

CISA Urges Ivanti Flaw Fix

January 22, 2024
Reading Time: 3 mins read
in Alerts

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive, urging federal agencies to address actively exploited zero-day flaws in Ivanti Connect Secure (ICS) and Ivanti Policy Secure (IPS) products. These vulnerabilities, an authentication bypass (CVE-2023-46805) and a code injection bug (CVE-2024-21887), have become targets for multiple threat actors, allowing them to craft malicious requests and execute arbitrary commands on compromised systems. CISA emphasizes the urgency of mitigation measures due to a sharp increase in threat actor activity since the vulnerabilities were publicly disclosed on January 11, 2024.

Ivanti, the U.S. company behind the affected products, acknowledges the vulnerabilities and plans to release an update to address the flaws next week. In the meantime, CISA recommends immediate actions, including applying a temporary workaround provided by Ivanti through an XML file to make necessary configuration changes. Organizations using Ivanti products are urged to run an External Integrity Checker Tool to identify signs of compromise, disconnect affected devices from networks if compromise is found, reset devices, and import the XML file. Additionally, Federal Civilian Executive Branch (FCEB) entities are advised to take further steps, such as revoking and reissuing certificates, resetting passwords, and addressing potential API key issues.

Cybersecurity firms Volexity and Mandiant report observing attacks exploiting these flaws to deploy web shells and passive backdoors for persistent access to compromised devices. As many as 2,100 devices worldwide are estimated to have been compromised. The initial attack wave in December 2023 is attributed to a Chinese nation-state group, UTA0178. Mandiant, tracking the activity as UNC5221, notes that it has not been linked to any specific group or country. Threat intelligence firm GreyNoise observes opportunistic exploitation of the vulnerabilities for financial gain, with attackers dropping persistent backdoors and cryptocurrency miners.

Reference:
  • CISA Issues Emergency Directive Requiring Federal Agencies to Mitigate Ivanti Connect Secure and Policy Secure Vulnerabilities
Tags: CISACVECyber AlertCyber Alerts 2024Cyber RiskCyber threatCybersecurityFebruary 2024IvantiVulnerabilities
ADVERTISEMENT

Related Posts

Apple Backports Fix For Exploited Bug

Apple Backports Fix For Exploited Bug

September 18, 2025
Apple Backports Fix For Exploited Bug

FileFix Uses Steganography To Drop StealC

September 18, 2025
Apple Backports Fix For Exploited Bug

Google Removes 224 Android Malware Apps

September 18, 2025
DHS Data Hub Leaked Sensitive Intel

ChatGPT Calendar Flaw Lets Email Theft

September 17, 2025
DHS Data Hub Leaked Sensitive Intel

Windows Update Breaks SMBv1 Shares

September 17, 2025
DHS Data Hub Leaked Sensitive Intel

Scattered Spider Returns Despite Exit

September 17, 2025

Latest Alerts

FileFix Uses Steganography To Drop StealC

Apple Backports Fix For Exploited Bug

Google Removes 224 Android Malware Apps

ChatGPT Calendar Flaw Lets Email Theft

Windows Update Breaks SMBv1 Shares

Scattered Spider Returns Despite Exit

Subscribe to our newsletter

    Latest Incidents

    AI Forged Military IDs Used In Phishing

    Insight Partners Warns After Data Breach

    ShinyHunters Claims Salesforce Data Theft

    DHS Data Hub Leaked Sensitive Intel

    Worm Infects 180 npm Packages

    Jaguar Land Rover Delays Restart After Cyberattack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial