Open Nav
Sign Up

CISA’s Advisory on Ivanti Vulnerabilities and Mitigation Challenges (CVE-2023-46805, CVE-2024-21887)

Bar Refael

January 23, 2024

Vulnerability Summary:

  • Affected Products: Ivanti Connect Secure (ICS) and Ivanti Policy Secure (IPS)
  • Notable Vulnerabilities: CVE-2023-46805, CVE-2024-21887
  • Impact: High, with widespread attacks observed

Context:

Following CISA’s Emergency Directive (ED) 24-01 addressing critical vulnerabilities in Ivanti products, Ivanti has issued an additional warning. The company advises against pushing new device configurations post-mitigation applications due to a race condition that causes key web services to stop, rendering the mitigation ineffective.

Key Developments:

  • Mitigation Risks: Applying new configurations to Ivanti appliances can disable the mitigation measures, making devices vulnerable to ongoing attacks.
  • Affected Processes: Configuration pushes through Pulse One or nSA, and both full and partial pushes, can trigger this issue.
  • Recommendation: Ivanti advises halting configuration pushes until after appliances are patched.
  • Attack Scope: Large-scale attacks have been observed exploiting the vulnerabilities, particularly CVE-2023-46805 and CVE-2024-21887, allowing attackers extensive network access, data exfiltration, and persistent system breach.

Implications for Organizations:

  • Widespread Impact: Thousands of Ivanti appliances are exposed online, with significant numbers already compromised.
  • Diverse Victimology: The attacks have impacted a wide range of sectors, including government, military, telecommunications, defense, technology, finance, and aerospace industries.
  • Variety of Attackers: Multiple threat actors, including state-backed groups, have exploited these vulnerabilities, deploying webshells, malware, and cryptocurrency miners.

Action Items for OP Innovate Clients:

  • Immediate Configuration Freeze: Cease all new configuration pushes to Ivanti appliances until further notice.
  • Reassess Mitigations: Review and reapply mitigation measures if configurations were changed post-mitigation.
  • Enhanced Monitoring: Intensify surveillance of Ivanti appliances for signs of compromise.
  • Incident Reporting: Promptly report any suspected compromises or anomalies.
  • Await Patches: Prepare to implement security patches from Ivanti as soon as they are released.

Closing Note:

The current scenario highlights the intricate and evolving nature of cybersecurity challenges. OP Innovate is committed to delivering up-to-date intelligence and support, assisting our clients in adeptly managing these complexities.

Stay Safe and Informed,

OP Innovate.

Resources highlights

Securing Active Directory: Lessons From the Field

Active Directory interconnects users, devices, and servers in an enterprise, making it a high-value target for attackers. A breach in AD can grant adversaries the…

Read more >

Securing Active Directory

Google Chrome Zero-Day Actively Exploited: CVE-2025-13223

A new high-severity zero-day in Google Chrome is being actively exploited to compromise users through malicious websites. The vulnerability, tracked as CVE-2025-13223, is a type…

Read more >

CVE-2025-13223

Critical Remote Code Execution in WatchGuard Firebox VPN Appliances: CVE-2025-9242

A critical vulnerability in WatchGuard Firebox firewalls is being actively exploited to gain remote, unauthenticated code execution on perimeter devices. The flaw, tracked as CVE-2025-9242,…

Read more >

CVE-2025-9242

Critical Zero-Day in Samsung Galaxy Devices: CVE-2025-21042

A newly disclosed zero-day vulnerability in Samsung Galaxy smartphones has been actively exploited in the wild to deploy a sophisticated Android spyware framework known as…

Read more >

CVE-2025-21042

Critical RCE in CentOS Web Panel (CVE-2025-48703)

CVE-2025-48703 is a critical unauthenticated remote-code-execution (OS command injection) vulnerability in Control Web Panel (CWP / CentOS Web Panel) that allows attackers to inject shell…

Read more >

CVE-2025-48703

Actively Exploited Critical Vulnerability in Post SMTP Plugin for WordPress: CVE-2025-11833

A critical vulnerability (CVE-2025-11833) in the widely used Post SMTP WordPress plugin is being actively exploited to hijack administrator accounts and gain full control of…

Read more >

CVE-2025-11833
Under Cyber Attack?

Fill out the form and we will contact you immediately.