Article Details

Scrape Timestamp (UTC): 2024-03-21 03:57:55.195

Source: https://thehackernews.com/2024/03/ivanti-releases-urgent-fix-for-critical.html

Original Article Text

Click to Toggle View

Ivanti Releases Urgent Fix for Critical Sentry RCE Vulnerability. Ivanti has disclosed details of a critical remote code execution flaw impacting Standalone Sentry, urging customers to apply the fixes immediately to stay protected against potential cyber threats. Tracked as CVE-2023-41724, the vulnerability carries a CVSS score of 9.6. "An unauthenticated threat actor can execute arbitrary commands on the underlying operating system of the appliance within the same physical or logical network," the company said. The flaw impacts all supported versions 9.17.0, 9.18.0, and 9.19.0, as well as older versions. The company said it has made available a patch (versions 9.17.1, 9.18.1, and 9.19.1) that can be downloaded via the standard download portal. It credited Vincent Hutsebaut, Pierre Vivegnis, Jerome Nokin, Roberto Suggi Liverani and Antonin B. of NATO Cyber Security Centre for "their collaboration on this issue." Ivanti emphasized that it's not aware of any customers affected by CVE-2023-41724, and added that "threat actors without a valid TLS client certificate enrolled through EPMM cannot directly exploit this issue on the internet." Recently disclosed security flaws in Ivanti software have been subject to exploitation by at least three different suspected China-linked cyber espionage clusters tracked as UNC5221, UNC5325, and UNC3886, according to Mandiant. The development comes as SonarSource revealed a mutation cross-site scripting (mXSS) flaw impacting an open-source email client called Mailspring aka Nylas Mail (CVE-2023-47479) that could be exploited to bypass sandbox and Content Security Policy (CSP) protections and achieve code execution when a user replies to or forwards a malicious email. "mXSS takes advantage of that by providing a payload that seems innocent initially when parsing (during the sanitization process) but mutates it to a malicious one when re-parsing it (in the final stage of displaying the content)," security researcher Yaniv Nizry said. Goodbye, Atlassian Server. Goodbye… Backups? Protect your data on Atlassian Cloud from disaster with Rewind's daily backups and on-demand restores. Take Action Fast with Censys Search for Security Teams Stay ahead of advanced threat actors with best-in-class threat intelligence from Censys Search.

Daily Brief Summary

MALWARE // Ivanti Releases Critical Fix for Standalone Sentry RCE Flaw

Ivanti has disclosed a critical remote code execution (RCE) vulnerability in Standalone Sentry, designated as CVE-2023-41724 with a CVSS score of 9.6.

The flaw allows an unauthenticated attacker to execute arbitrary commands on the appliance if they are on the same physical or logical network.

All supported Standalone Sentry versions are affected, but Ivanti has issued a patch to address the issue.

Versions 9.17.1, 9.18.1, and 9.19.1 of the software are available for download and customers are urged to update immediately.

The vulnerability was discovered in collaboration with cybersecurity experts from the NATO Cyber Security Centre, though no known exploitations have been reported.

Ivanti notes that to exploit the flaw on the internet, a threat actor would require a valid TLS client certificate enrolled through EPMM, adding an extra layer of security.

The disclosure comes amid previous exploitations of Ivanti's vulnerabilities by suspected China-linked cyber espionage groups, highlighting ongoing concerns around cyber threats targeting Ivanti software.