CISA demands patching for crucial Ivanti security vulnerability

March 22, 2024
1 min read





TLDR:

  • CISA issued advisory for critical Ivanti vulnerability, encouraging patching
  • RCE vulnerability in Ivanti Standalone Sentry could allow threat actors control of affected systems

CISA has urged organizations to address a critical remote code execution (RCE) vulnerability in Ivanti Standalone Sentry. This vulnerability, tracked at CVE-2023-41724, allows threat actors to execute arbitrary commands on the operating system of the appliance within the same network. Despite no known exploitation of this vulnerability at the time of disclosure, the severity score of 9.6 out of 10.0 highlights the importance of patching.

The issue follows previous security concerns with Ivanti systems, including the compromised CISA systems in February due to hackers exploiting Ivanti VPN vulnerabilities. With the increased risk posed by these vulnerabilities, CISA has been taking proactive measures to ensure the security of federal civilian agencies, including emergency directives and temporary disconnection of Ivanti Connect Secure VPNs.

It is crucial for organizations to stay updated with Ivanti advisories, apply necessary updates, and consider discontinuing the use of widely exploited Ivanti VPNs to mitigate the risk of cyber threats.


Latest from Blog

EU push for unified incident report rules

TLDR: The Federation of European Risk Management Associations (FERMA) is urging the EU to harmonize cyber incident reporting requirements ahead of new legislation. Upcoming legislation such as the NIS2 Directive, DORA, and