Description

Ivanti has disclosed the active exploitation of three new security vulnerabilities in its Cloud Service Appliance (CSA), identified as CVE-2024-9379, CVE-2024-9380, and CVE-2024-9381. These flaws are being weaponized alongside a previously patched vulnerability, CVE-2024-8963, in attacks targeting CSA versions 4.6 patch 518 and earlier. The vulnerabilities pose significant risks to systems running outdated CSA versions. An SQL injection flaw in the admin web console allows attackers to execute arbitrary SQL commands via CVE-2024-9379 (CVSS score: 6.5). Additionally, CVE-2024-9380 (CVSS score: 7.2) leads to remote code execution. Finally, CVE-2024-9381 (CVSS score: 7.2) enables path traversal, bypassing system security restrictions. These vulnerabilities, when chained with CVE-2024-8963 (CVSS score: 9.4), a critical path traversal flaw, allow remote unauthenticated attackers to exploit the system. Ivanti’s investigation into CVE-2024-8963 also uncovered CVE-2024-8190, another OS command injection vulnerability, now patched but previously exploited. Ivanti urges users to upgrade to CSA version 5.0.2 to mitigate these risks and recommends checking for unauthorized administrative users or suspicious activity using endpoint detection and response (EDR) tools. Importantly, no exploitation has been observed in environments running CSA 5.0 or later.This announcement follows the U.S. Cybersecurity and Infrastructure Security Agency’s (CISA) addition of a vulnerability in Ivanti Endpoint Manager (CVE-2024-29824) to its Known Exploited Vulnerabilities catalog.