प्लेटफ़ॉर्म
ivanti
घटक
ivanti-connect-secure
में ठीक किया गया
22.7R2.4
22.7R1.3
CVE-2024-10644 describes a critical remote code execution (RCE) vulnerability affecting Ivanti Connect Secure versions up to and including 22.7R2.4 and Ivanti Policy Secure before version 22.7R1.3. An authenticated attacker with administrative privileges can exploit this flaw to inject arbitrary code, potentially gaining complete control over the affected system. A fix is available in version 22.7R2.4, and immediate patching is strongly recommended.
The impact of CVE-2024-10644 is severe. Successful exploitation allows a remote, authenticated administrator to execute arbitrary code on the Ivanti Connect Secure server. This can lead to complete system compromise, including data exfiltration, privilege escalation, and the installation of persistent malware. Attackers could leverage this access to pivot to other systems within the network, leading to widespread lateral movement and a significant blast radius. Given the nature of Ivanti Connect Secure as a gateway for remote access, a successful attack could expose sensitive internal resources and intellectual property. The requirement for admin privileges, while a barrier, does not negate the severity, as attackers may attempt to compromise accounts with these privileges.
CVE-2024-10644 has garnered significant attention due to its critical severity and potential for widespread exploitation. It was publicly disclosed on 2025-02-11. While no active exploitation campaigns have been definitively confirmed as of this writing, the availability of a remote code execution vulnerability with administrative privilege requirements makes it a high-value target for attackers. The vulnerability is tracked on CISA KEV, indicating a heightened risk of exploitation. Public proof-of-concept exploits are anticipated and should be monitored for.
Organizations heavily reliant on Ivanti Connect Secure for remote access, particularly those with legacy deployments of versions prior to 22.7R2.4, are at significant risk. Shared hosting environments where multiple tenants share the same Connect Secure instance are also particularly vulnerable, as a compromise of one tenant could potentially impact others. Furthermore, organizations with weak password policies or inadequate multi-factor authentication for administrative accounts are more susceptible to exploitation.
• linux / server: Monitor Ivanti Connect Secure logs (typically located in /opt/ivanti/connectsecure/logs) for unusual command execution attempts or suspicious network activity. Use journalctl -u connectsecure to filter for error messages related to code injection.
journalctl -u connectsecure | grep -i "code injection"• ivanti: Review Ivanti Connect Secure audit logs for administrative actions that deviate from normal patterns. Check for unexpected file modifications or process creations. • generic web: Monitor access logs for requests containing suspicious payloads or unusual characters that could indicate code injection attempts. Examine response headers for signs of code execution. • windows / supply-chain: (Less likely, but possible if Connect Secure runs on Windows) Monitor PowerShell execution logs for suspicious commands related to Connect Secure processes. Use Windows Defender to scan for malicious files associated with the vulnerability.
disclosure
patch
एक्सप्लॉइट स्थिति
EPSS
6.84% (91% शतमक)
CISA SSVC
CVSS वेक्टर
The primary mitigation for CVE-2024-10644 is to immediately upgrade Ivanti Connect Secure to version 22.7R2.4 or later. If upgrading is not immediately feasible, consider implementing temporary workarounds. While no specific WAF rules are publicly available, restricting access to potentially vulnerable endpoints and implementing strict authentication policies can help reduce the attack surface. Monitor system logs for suspicious activity, particularly attempts to execute commands or access sensitive files. After upgrading, verify the fix by attempting to reproduce the vulnerability using known exploitation techniques (if available) or by reviewing Ivanti's security advisory for confirmation.
Ivanti Connect Secure को संस्करण 22.7R2.4 या बाद के संस्करण में अपडेट करें। यह कोड इंजेक्शन (code injection) भेद्यता को ठीक करेगा जो दूरस्थ कोड निष्पादन (remote code execution) की अनुमति देता है।
भेद्यता विश्लेषण और गंभीर अलर्ट सीधे आपके ईमेल में।
CVE-2024-10644 is a critical remote code execution vulnerability in Ivanti Connect Secure versions up to 22.7R2.4. An authenticated admin can inject code, potentially leading to full system compromise.
You are affected if you are running Ivanti Connect Secure versions prior to 22.7R2.4. Check your version and upgrade immediately.
Upgrade Ivanti Connect Secure to version 22.7R2.4 or later. If immediate upgrade is not possible, implement temporary workarounds as described in the advisory.
While no active exploitation campaigns have been definitively confirmed, the vulnerability's severity and ease of exploitation make it a high-value target, and exploitation is likely.
Refer to the official Ivanti Security Advisory for detailed information and mitigation steps: [https://www.ivanti.com/support/security-advisories/SB0063](https://www.ivanti.com/support/security-advisories/SB0063)
अपनी डिपेंडेंसी फ़ाइल अपलोड करें और तुरंत जानें कि यह CVE और अन्य आपको प्रभावित करती हैं या नहीं।