Article Details
Scrape Timestamp (UTC): 2024-08-14 05:23:19.929
Source: https://thehackernews.com/2024/08/critical-flaw-in-ivanti-virtual-traffic.html
Original Article Text
Click to Toggle View
Critical Flaw in Ivanti Virtual Traffic Manager Could Allow Rogue Admin Access. Ivanti has rolled out security updates for a critical flaw in Virtual Traffic Manager (vTM) that could be exploited to achieve an authentication bypass and create rogue administrative users. The vulnerability, tracked as CVE-2024-7593, has a CVSS score of 9.8 out of a maximum of 10.0. "Incorrect implementation of an authentication algorithm in Ivanti vTM other than versions 22.2R1 or 22.7R2 allows a remote unauthenticated attacker to bypass authentication of the admin panel," the company said in an advisory. It impacts the following versions of vTM - As temporary mitigation, Ivanti is recommending customers to limit admin access to the management interface or restrict access to trusted IP addresses. While there is no evidence that the flaw has been exploited in the wild, it acknowledged the public availability of a proof-of-concept (PoC), making it essential that users apply the latest fixes as soon as possible. Separately, Ivanti has also addressed two shortcomings in Neurons for ITSM that could result in information disclosure and gain unauthorized access to the devices as any user - The issues, which affect versions 2023.4, 2023.3, and 2023.2, have been resolved in versions 2023.4 w/ patch, 2023.3 w/ patch, and 2023.2 w/ patch, respectively. Also patched by the company are five high-severity flaws (CVE-2024-38652, CVE-2024-38653, CVE-2024-36136, CVE-2024-37399, and CVE-2024-37373) in Ivanti Avalanche that could be exploited to achieve a denial-of-service (DoS) condition or remote code execution. They have been fixed in version 6.4.4.
Daily Brief Summary
Ivanti has issued updates fixing a critical vulnerability in Virtual Traffic Manager (vTM) that could allow authentication bypass and rogue admin creation.
The flaw, identified as CVE-2024-7593, is severe with a CVSS score of 9.8 and affects several versions of vTM.
Attackers could exploit the vulnerability to gain unauthorized access to the admin panel without authentication.
Temporary mitigations include limiting management interface access to trusted IPs.
Although not yet exploited in the wild, a proof of concept is publicly available, heightening the risk.
Ivanti also patched additional vulnerabilities in Neurons for ITSM and Avalanche, addressing information disclosure and potential DoS attacks.
Users are urged to apply these security patches immediately to safeguard their systems from potential threats.