Actively exploited zero-day vulnerabilities in Ivanti Connect Secure (ICS) VPN appliance, identified as CVE-2023-46805 and CVE-2024-21887, allowing attackers to bypass two-factor authentication and execute malicious code. Security firm Volexity reported that these vulnerabilities enable attackers to modify system files and steal credentials. Exploiting these vulnerabilities, attributed to the suspected Chinese nation-state threat actor UTA0178, leads to significant network access. Despite current low-level, targeted exploitation, there is potential for wider abuse if mitigations are not promptly applied.
2 thoughts on “Critical Zero-Day Exploits in Ivanti VPN: Bypassing 2FA and Commanding Network Control”
Leave a Reply
You must be logged in to post a comment.
Pingback: How LockBit Became a Dominant Force in the Ransomware Landscape - SecurityMike
Pingback: Phishing Scams 2024: Identifying and Avoiding New Techniques - SecurityMike