Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Unpatched Ivanti Endpoints at High Risk

February 16, 2024
Reading Time: 3 mins read
in Alerts

Thousands of Ivanti Connect Secure and Policy Secure endpoints remain vulnerable to multiple security issues, some of which were disclosed over a month ago but have yet to be fully patched by the vendor. These vulnerabilities, ranging from high to critical severity, include authentication bypass, server-side-request forgery, arbitrary command execution, and command injection problems. While some have been exploited by nation-state actors and subsequently leveraged by a broader range of threat actors, others, like the XXE vulnerability in the SAML component (CVE-2024-22024), are being actively targeted by scanning activities.

Despite the urgency communicated by security experts, a significant number of Ivanti endpoints continue to operate without the necessary patches or mitigations. For instance, CVE-2024-22024, a critical XXE vulnerability, has led to scanning activity targeting vulnerable systems. The situation is further exacerbated by the discovery that more than half of the internet-exposed Ivanti servers remain unpatched, leaving organizations vulnerable to potential exploitation and data breaches.

Notably, the disclosure timeline for these vulnerabilities has left administrators with limited time to prepare and apply patches, complicating remediation efforts. As a result, the risk of prolonged exposure to exploitation persists, providing threat actors with a substantial pool of potential targets. The urgent need for organizations to prioritize patching or mitigation measures cannot be overstated, given the serious consequences of unauthorized access and data compromise associated with these vulnerabilities.

Reference:
  • We have added improvements to our Ivanti Connect Secure VPN scans to better detect unpatched versions vulnerable to CVE-2024-22024 (~3900 found) & CVE-2024-21887 (~ 1000 found)
  • Observed Scanning Activity for CVE-2024-22024 – XXE Vulnerability in Ivanti Products
Tags: Cyber AlertCyber Alerts 2024Cyber threatCybersecurityFebruary 2024IvantiVulnerabilities
ADVERTISEMENT

Related Posts

Fortinet Flaw Used To Create Admins

Interview Campaign Exploits JSON Storage

November 18, 2025
Fortinet Flaw Used To Create Admins

Iran Hackers Launch SpearSpecter Spying

November 18, 2025
Fortinet Flaw Used To Create Admins

Fortinet Flaw Used To Create Admins

November 18, 2025
Dragon Breath Deploys Roninloader Ghosts

Rondodox Targets XWiki To Grow Botnet

November 17, 2025
Dragon Breath Deploys Roninloader Ghosts

Windows 10 Update Error 800f0922

November 17, 2025
Dragon Breath Deploys Roninloader Ghosts

Dragon Breath Deploys Roninloader Ghosts

November 17, 2025

Latest Alerts

Interview Campaign Exploits JSON Storage

Iran Hackers Launch SpearSpecter Spying

Fortinet Flaw Used To Create Admins

Rondodox Targets XWiki To Grow Botnet

Windows 10 Update Error 800f0922

Dragon Breath Deploys Roninloader Ghosts

Subscribe to our newsletter

    Latest Incidents

    Princeton Reports Donor Data Breach

    Massive Cloud DDoS Hits Microsoft Azure

    Kenyan Gov Sites Back Online After Hack

    Logitech Confirms Major Data Breach

    Hackers Steal Maternity Ward Videos

    Checkoutcom Rejects Hackers After Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial