Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 2 / 3
47 résultats taggé ivanti  ✕
Advanced Cyber Threats Impact Even the Most Prepared https://medium.com/mitre-engenuity/advanced-cyber-threats-impact-even-the-most-prepared-56444e980dc8
24/04/2024 12:30:44
QRCode
archive.org

Foreign nation-state cyber adversaries are tenacious. Their attacks are evolving to get around the industry’s most sophisticated defenses. Last year was exploitation of routers, and this year’s theme has been compromise of edge protection devices.

MITRE, a company that strives to maintain the highest cybersecurity possible, is not immune.

Despite our commitment to safeguarding our digital assets, we’ve experienced a breach that underscores the nature of modern threats. In this blog post, we provide an initial account of the incident, outlining the tactics, techniques, and procedures (TTPs) employed by the adversaries, as well as some of our ongoing incident response efforts and recommendations for future steps to fortify your defenses.

medium EN 2024 MITRE cyberincident Ivanti TTPs
MITRE says state hackers breached its network via Ivanti zero-days https://www.bleepingcomputer.com/news/security/mitre-says-state-hackers-breached-its-network-via-ivanti-zero-days/
21/04/2024 20:51:39
QRCode
archive.org
thumbnail

The MITRE Corporation says a state-backed hacking group breached its systems in January 2024 by chaining two Ivanti VPN zero-days.

bleepingcomputer EN 2024 Breach Ivanti MITRE Zero-Day Security InfoSec Computer-Security
Ivanti warns of critical flaws in its Avalanche MDM solution https://www.bleepingcomputer.com/news/security/ivanti-warns-of-critical-flaws-in-its-avalanche-mdm-solution/#google_vignette
17/04/2024 13:27:39
QRCode
archive.org
thumbnail

Ivanti has released security updates to fix 27 vulnerabilities in its Avalanche mobile device management (MDM) solution, two of them critical heap overflows that can be exploited for remote command execution.

bleepingcomputer EN 2024 Ivanti Ivanti-Avalanche Mobile-Device-Management Remote-Command-Execution CVE-2024-24996 CVE-2024-29204
Thousands of Ivanti VPN Appliances Impacted by Recent Vulnerability https://www.securityweek.com/thousands-of-ivanti-vpn-appliances-impacted-by-recent-vulnerability/
14/04/2024 15:35:21
QRCode
archive.org

The Shadowserver Foundation identifies thousands of Ivanti VPN instances likely impacted by a recent remote code execution flaw.

securityweek EN 2024 Shadowserver Ivanti VPN CVE-2024-21894 vulnerable
Ivanti fixes VPN gateway vulnerability allowing RCE, DoS attacks https://www.bleepingcomputer.com/news/security/ivanti-fixes-vpn-gateway-vulnerability-allowing-rce-dos-attacks/#google_vignette
04/04/2024 19:02:02
QRCode
archive.org
thumbnail

IT security software company Ivanti has released patches to fix multiple security vulnerabilities impacting its Connect Secure and Policy Secure gateways.

bleepingcomputer EN 2024 Connect-Secure Denial-of-Service DoS Ivanti Policy-Secure RCE Remote-Code-Execution Security InfoSec Computer-Security
Ivanti fixes critical Standalone Sentry bug reported by NATO https://www.bleepingcomputer.com/news/security/ivanti-fixes-critical-standalone-sentry-bug-reported-by-nato/
20/03/2024 22:40:25
QRCode
archive.org
thumbnail

Ivanti warned customers to immediately patch a critical severity Standalone Sentry vulnerability reported by NATO Cyber Security Centre researchers.

bleepingcomputer EN 2024 Ivanti NATO Vulnerability Security InfoSec Computer-Security
CISA forced to take two systems offline last month after Ivanti compromise https://therecord.media/cisa-takes-two-systems-offline-following-ivanti-compromise
08/03/2024 20:07:38
QRCode
archive.org
thumbnail

Hackers breached the systems of the Cybersecurity and Infrastructure Security Agency (CISA) in February through vulnerabilities in Ivanti products, officials said.

therecord.media EN 2024 CISA Ivanti Gateway comprimised offline CVE-2023-46805 CVE-2024-21887 CVE-2024-21893
CISA cautions against using hacked Ivanti VPN gateways even after factory resets https://www.bleepingcomputer.com/news/security/cisa-cautions-against-using-hacked-ivanti-vpn-gateways-even-after-factory-resets/
01/03/2024 09:44:05
QRCode
archive.org
thumbnail

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) revealed today that attackers who hack Ivanti VPN appliances using one of multiple actively exploited vulnerabilities may be able to maintain root persistence even after performing factory resets.

bleepingcomputer EN 2024 CISA FBI Ivanti Warning
Failles d’Ivanti : une centaine d’organisations victimes en France https://www.zdnet.fr/actualites/failles-d-ivanti-une-centaine-d-organisations-victimes-en-france-39964604.htm
01/03/2024 09:42:53
QRCode
archive.org
thumbnail

Dans la plupart des cas, les attaquants n’ont pas tenté d’aller plus loin, sauf quelques exceptions. Il s’agissait vraisemblablement pour les attaquants de mettre d’abord un premier pied chez leur cible.

zdnet EN 2024 Ivanti France victimes attaquants
Threat Actors Exploit Multiple Vulnerabilities in Ivanti Connect Connect and Policy Secure Gateways | CISA https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-060b
29/02/2024 19:44:12
QRCode
archive.org

Based upon the authoring organizations’ observations during incident response activities and available industry reporting, as supplemented by CISA’s research findings, the authoring organizations recommend that the safest course of action for network defenders is to assume a sophisticated threat actor may deploy rootkit level persistence on a device that has been reset and lay dormant for an arbitrary amount of time. For example, as outlined in PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure), sophisticated actors may remain silent on compromised networks for long periods. The authoring organizations strongly urge all organizations to consider the significant risk of adversary access to, and persistence on, Ivanti Connect Secure and Ivanti Policy Secure gateways when determining whether to continue operating these devices in an enterprise environment.

CISA EN 2024 Ivanti Vulnerabilities Connect persistence Warning
Code injection or backdoor: A new look at Ivanti’s CVE-2021-44529 https://www.labs.greynoise.io/grimoire/2024-02-what-is-this-old-ivanti-exploit/index.html
18/02/2024 02:35:49
QRCode
archive.org
thumbnail

In 2021, Ivanti patched a vulnerability that they called “code injection”. Rumors say it was a backdoor in an open source project. Let’s find out what actually happened!

greynoise EN 2024 backdoor Ivanti CVE-2021-44529 analysis
Hackers exploit Ivanti SSRF flaw to deploy new DSLog backdoor https://www.bleepingcomputer.com/news/security/hackers-exploit-ivanti-ssrf-flaw-to-deploy-new-dslog-backdoor/
13/02/2024 10:13:40
QRCode
archive.org
thumbnail

Hackers are exploiting a server-side request forgery (SSRF) vulnerability in Ivanti Connect Secure, Policy Secure, and ZTA gateways to deploy the new DSLog backdoor on vulnerable devices.

bleepingcomputer EN 2024 Backdoor Ivanti Malware SSRF Vulnerability Security InfoSec Computer-Security
Ivanti: Patch new Connect Secure auth bypass bug immediately https://www.bleepingcomputer.com/news/security/ivanti-patch-new-connect-secure-auth-bypass-bug-immediately/
08/02/2024 21:25:42
QRCode
archive.org
thumbnail

Today, Ivanti warned of a new authentication bypass vulnerability impacting Connect Secure, Policy Secure, and ZTA gateways, urging admins to secure their appliances immediately.

bleepingcomputer EN 2024 CVE-2024-22024 Authentication-Bypass Connect-Secure Ivanti Policy-Secure Warning Security InfoSec Computer-Security
CVE-2024-22024 (XXE) for Ivanti Connect Secure and Ivanti Policy Secure https://forums.ivanti.com/s/article/CVE-2024-22024-XXE-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure?language=en_US
08/02/2024 21:24:51
QRCode
archive.org

As part of our ongoing investigation into the vulnerabilities impacting Ivanti Connect Secure, Ivanti Policy Secure and ZTA gateways, we have discovered a new vulnerability. This vulnerability only affects a limited number of supported versions – Ivanti Connect Secure (version 9.1R14.4, 9.1R17.2, 9.1R18.3, 22.4R2.2 and 22.5R1.1), Ivanti Policy Secure version 22.5R1.1 and ZTA version 22.6R1.3.
A patch is available now for Ivanti Connect Secure (versions 9.1R14.5, 9.1R17.3, 9.1R18.4, 22.4R2.3, 22.5R1.2, 22.5R2.3 and 22.6R2.2), Ivanti Policy Secure (versions 9.1R17.3, 9.1R18.4 and 22.5R1.2) and ZTA gateways (versions 22.5R1.6, 22.6R1.5 and 22.6R1.7).

ivanti EN advisory CVE-2024-22024
Security Update for Ivanti Connect Secure and Ivanti Policy Secure Gateways https://www.ivanti.com/blog/security-update-for-ivanti-connect-secure-and-ivanti-policy-secure-gateways-282024
08/02/2024 21:23:02
QRCode
archive.org

At Ivanti, our top priority is upholding our commitment to deliver and maintain secure products for our customers. Our team has been working around the clock to aggressively review all code and is singularly focused on bringing full resolution to the issues affecting Ivanti Connect Secure (formerly Pulse Connect Secure), Ivanti Policy Secure and ZTA gateways.

We have been following our product incident response process and rigorously assessing our products and code alongside world-class security experts and collaborating with the broader security ecosystem to share intelligence. We are committed to communicating findings openly with customers, consistent with our commitment to security and responsible disclosure.

ivanti EN 2024 CVE-2024-22024 Security Update
Zero Day Initiative — CVE-2023-46263: Ivanti Avalanche Arbitrary File Upload Vulnerability https://www.zerodayinitiative.com/blog/2024/2/5/cve-2023-46263-ivanti-avalanche-arbitrary-file-upload-vulnerability
06/02/2024 18:40:29
QRCode
archive.org
thumbnail

In this excerpt of a Trend Micro Vulnerability Research Service vulnerability report, Lucas Miller and Dusan Stevanovic of the Trend Micro Research Team detail a recently patched remote code execution vulnerability in the Ivanti Avalanche enterprise mobility management program. Other Ivanti products

zerodayinitiative EN 2024 CVE-2023-46263 Ivanti Avalanche analysis
How Memory Forensics Revealed Exploitation of Ivanti Connect Secure VPN Zero-Day Vulnerabilities https://www.volexity.com/blog/2024/02/01/how-memory-forensics-revealed-exploitation-of-ivanti-connect-secure-vpn-zero-day-vulnerabilities/
01/02/2024 18:46:42
QRCode
archive.org
thumbnail

Volexity regularly prioritizes memory forensics when responding to incidents. This strategy improves investigative capabilities in many ways across Windows, Linux, and macOS. This blog post highlights some specific ways memory forensics played a key role in determining how two zero-day vulnerabilities were being chained together to achieve unauthenticated remote code execution in Ivanti Connect Secure VPN devices.

volexity EN 2024 Ivanti Connect Secure VPN Zero-Day Vulnerabilities
Ivanti Connect Secure VPN Exploitation: New Observations https://www.volexity.com/blog/2024/01/18/ivanti-connect-secure-vpn-exploitation-new-observations/
19/01/2024 08:53:57
QRCode
archive.org
thumbnail

On January 15, 2024, Volexity detailed widespread exploitation of Ivanti Connect Secure VPN vulnerabilities CVE-2024-21887 and CVE-2023-46805. In that blog post, Volexity detailed broader scanning and exploitation by threat actors using still non-public exploits to compromise numerous devices. Subsequently, Volexity has observed an increase in attacks from various threat actors against Ivanti Connect Secure VPN appliances beginning the same day.

volexity EN 2024 CVE-2023-46805 CVE-2024-21887 Ivanti Observations
CVE-2023-46805 https://attackerkb.com/topics/AdUh6by52K/cve-2023-46805/rapid7-analysis
16/01/2024 14:39:31
QRCode
archive.org
thumbnail

Starting January 10, 2024, multiple parties (Ivanti, Volexity, and Mandiant) disclosed the existence of a zero-day exploit chain affecting Ivanti Connect Secur…

attackerkb EN 2023 CVE-2023-46805 Ivanti 0-day API
Ivanti Connect Secure VPN Exploitation Goes Global https://www.volexity.com/blog/2024/01/15/ivanti-connect-secure-vpn-exploitation-goes-global/
16/01/2024 08:42:34
QRCode
archive.org
thumbnail

On January 10, 2024, Volexity publicly shared details of targeted attacks by UTA00178 exploiting two zero-day vulnerabilities (CVE-2024-21887 and CVE-2023-46805) in Ivanti Connect Secure (ICS) VPN appliances. On the same day, Ivanti published a mitigation that could be applied to ICS VPN appliances to prevent exploitation of these vulnerabilities. Since publication of these details, Volexity has continued to monitor its existing customers for exploitation. Volexity has also been contacted by multiple organizations that saw signs of compromise by way of mismatched file detections. Volexity has been actively working multiple new cases of organizations with compromised ICS VPN appliances.

volexity EN 2024 CVE-2024-21887 CVE-2023-46805 Ivanti Connect Secure Exploitation mass-exploitation
page 2 / 3
4477 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio