{"id":168388,"date":"2024-09-14T10:30:47","date_gmt":"2024-09-14T10:30:47","guid":{"rendered":"https:\/\/securityaffairs.com\/?p=168388"},"modified":"2024-09-14T10:32:02","modified_gmt":"2024-09-14T10:32:02","slug":"ivanti-csa-cve-2024-8190","status":"publish","type":"post","link":"https:\/\/securityaffairs.com\/168388\/hacking\/ivanti-csa-cve-2024-8190.html","title":{"rendered":"Ivanti Cloud Service Appliance flaw is being actively exploited in the wild"},"content":{"rendered":"
<\/div>\n

Ivanti warned that recently patched flaw CVE-2024-8190 in Cloud Service Appliance (CSA) is being actively exploited in the wild.<\/h2>\n\n\n\n

Ivanti warned that a newly patched vulnerability, tracked as CVE-2024-8190 (CVSS score of 7.2), in its Cloud Service Appliance (CSA) is being actively exploited. <\/p>\n\n\n\n

“Following public disclosure, Ivanti has confirmed exploitation of this vulnerability in the wild. At the time of this update, we are aware of a limited number of customers who have been exploited.” reads the update<\/a> provided by the company on September 13, 2024.<\/em><\/p>\n\n\n\n

An attacker can trigger this high-severity vulnerability to achieve remote code execution under specific conditions.<\/p>\n\n\n\n

“An OS command injection vulnerability in Ivanti Cloud Services Appliance versions 4.6 Patch 518 and before allows a remote authenticated attacker to obtain remote code execution. The attacker must have admin level privileges to exploit this vulnerability.” reads the advisory<\/a>.\u00a0<\/em><\/p>\n\n\n\n

“Successful exploitation could lead to unauthorized access to the device running the CSA. Dual-homed CSA configurations with ETH-0 as an internal network, as recommended by Ivanti, are at a significantly reduced risk of exploitation.”<\/em><\/p>\n\n\n\n

Ivanti released a security update for Ivanti CSA 4.6 to address the vulnerability. <\/p>\n\n\n\n

The company note that CSA 4.6 is End-of-Life<\/a>, and no longer receives updates for OS or third-party libraries. Customers must upgrade to Ivanti CSA 5.0 for continued support, this version is not impacted by this vulnerability. \u00a0<\/gwmw><\/p>\n\n\n\n

The company did not reveal details about the attacks exploiting the CVE-2024-8190 vulnerability. <\/gwmw><\/p>\n\n\n\n

Recently cybersecurity firm Horizon3.ai published a technical analysis<\/a> of an Ivanti Endpoint Manager AgentPortal Deserialization of Untrusted Data issue, tracked as CVE-2024-29847, that could allow remote code execution.<\/p>\n\n\n\n

Follow me on Twitter: @securityaffairs<\/strong><\/a> and Facebook<\/strong><\/a> and Mastodon<\/strong><\/a><\/p>\n\n\n\n

Pierluigi Paganini<\/strong><\/a><\/p>\n\n\n\n

(<\/strong>SecurityAffairs<\/strong><\/a>\u00a0\u2013<\/strong>\u00a0hacking, Cloud Service Appliance)\u00a0<\/strong><\/p>\n\n\n\n

<\/gwmw><\/p>\n","protected":false},"excerpt":{"rendered":"

Ivanti warned that recently patched flaw CVE-2024-8190 in Cloud Service Appliance (CSA) is being actively exploited in the wild. Ivanti warned that a newly patched vulnerability, tracked as CVE-2024-8190 (CVSS score of 7.2), in its Cloud Service Appliance (CSA) is being actively exploited. “Following public disclosure, Ivanti has confirmed exploitation of this vulnerability in the […]<\/p>\n","protected":false},"author":1,"featured_media":148963,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3323,5,55],"tags":[4112,9508,9506,10918,14209,15368,687,841,1533],"class_list":["post-168388","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-breaking-news","category-hacking","category-security","tag-hacking","tag-hacking-news","tag-information-security-news","tag-it-information-security","tag-ivanti","tag-ivanti-cloud-service-appliance","tag-pierluigi-paganini","tag-security-affairs","tag-security-news"],"yoast_head":"\n杭州江阴科强工业胶带有限公司