Tag: ivanti
-
Ivanti fixes three critical flaws in Connect Secure & Policy Secure
Ivanti has released security updates for Ivanti Connect Secure (ICS), Ivanti Policy Secure (IPS), and Ivanti Secure Access Client (ISAC) to address multiple vulnerabilities, including three critical severity problems. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/ivanti-fixes-three-critical-flaws-in-connect-secure-and-policy-secure/
-
Hackers Exploit Ivanti Connect Secure Vulnerability to Inject SPAWNCHIMERA malware
Tags: cve, cvss, cyber, cybersecurity, exploit, flaw, hacker, ivanti, malware, remote-code-execution, vulnerability, zero-dayIn a concerning development, cybersecurity experts have identified active exploitation of a critical vulnerability in Ivanti Connect Secure (ICS) appliances, tracked as CVE-2025-0282. This zero-day vulnerability, a stack-based buffer overflow with a CVSS score of 9.0, has been leveraged by attackers to deploy the advanced SPAWNCHIMERA malware. The flaw permits unauthenticated remote code execution, enabling…
-
Ivanti, Fortinet Patch Remote Code Execution Vulnerabilities
Ivanti and Fortinet on Tuesday released patches for multiple critical- and high-severity vulnerabilities in their products. The post Ivanti, Fortinet Patch Remote Code Execution Vulnerabilities appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/ivanti-fortinet-patch-remote-code-execution-vulnerabilities/
-
Kritische Codeschmuggel-Lücken in VPN und CSA
In Ivantis VPN-Software ICS, IPS und ISAC sowie in Ivanti CSA klaffen kritische Sicherheitslecks. Angreifer können Schadcode unterjubeln. First seen on heise.de Jump to article: www.heise.de/news/Ivanti-Kritische-Codeschmuggel-Luecken-in-VPN-und-CSA-10279170.html
-
Critical Ivanti CSA Vulnerability Allows Attackers Remote Code Execution to Gain Restricted Access
A critical vulnerability has been discovered in the Ivanti Cloud Services Application (CSA), potentially allowing attackers to execute remote code and access restricted functionality. Ivanti has released an urgent security update to address the issues, tracked as CVE-2024-47908 and CVE-2024-11771, urging customers to upgrade to version 5.0.5 to mitigate the threat. The two vulnerabilities affect…
-
Ivanti Patches Critical Flaws in Connect Secure and Policy Secure Update Now
Ivanti has released security updates to address multiple security flaws impacting Connect Secure (ICS), Policy Secure (IPS), and Cloud Services Application (CSA) that could be exploited to achieve arbitrary code execution.The list of vulnerabilities is below -CVE-2024-38657 (CVSS score: 9.1) – External control of a file name in Ivanti Connect Secure before version 22.7R2.4 and…
-
Attackers Use 2.8 Million Devices in Major Brute Force Attack
Threat actors are using as many as 2.8 million edge and IoT devices from around the world in a massive brute force attack that is targeting edge security systems from Palo Alto Networks, Ivanti, SonicWall, and other vendors, according to the Shadowserver Foundation. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/attackers-use-2-8-million-devices-in-major-brute-force-attack/
-
Edge Devices Face Surge in Mass Brute-Force Password Attacks
Scale of Long-Running Attacks ‘Unprecedented,’ Warns The Shadowserver Foundation. Honeypots designed to track malicious internet activity have detected a surge in brute-force password login attempts against edge devices, and especially – but not exclusively – targeting equipment manufactured by Palo Alto Networks, Ivanti and SonicWall, said The Shadowserver Foundation. First seen on govinfosecurity.com Jump to…
-
Massive brute force attack uses 2.8 million IPs to target VPN devices
A large-scale brute force password attack using almost 2.8 million IP addresses is underway, attempting to guess the credentials for a wide range of networking devices, including those from Palo Alto Networks, Ivanti, and SonicWall. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/massive-brute-force-attack-uses-28-million-ips-to-target-vpn-devices/
-
Ivanti Vulns Chained Together in Cyberattack Onslaught
The threat actors are abusing the vulnerabilities to gain initial access, obtain credentials, and install malicious scripts on user devices. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/cisa-ivanti-vulns-chained-attacks
-
CISA, FBI Examine Ivanti CSA Exploit Chains
First seen on scworld.com Jump to article: www.scworld.com/brief/cisa-fbi-examine-ivanti-csa-exploit-chains
-
Ivanti CSA exploit chains examined in joint CISA, FBI advisory
First seen on scworld.com Jump to article: www.scworld.com/brief/ivanti-csa-exploit-chains-examined-in-joint-cisa-fbi-advisory
-
Ivanti zero-days chained together in at least 3 attacks, authorities warn
The vendor’s customers have confronted multiple attack sprees targeting zero-days spanning a variety of products. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/ivanti-zero-days-chained-attacks/738130/
-
Hackers still exploiting older Ivanti bugs to breach networks
CISA and the FBI warned today that attackers are still exploiting Ivanti Cloud Service Appliances (CSA) security flaws patched since September to breach vulnerable networks. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/cisa-hackers-still-exploiting-older-ivanti-bugs-to-breach-networks/
-
Chained Vulnerabilities Exploited in Ivanti Cloud Service Appliances
Tags: cloud, credentials, exploit, ivanti, rce, remote-code-execution, service, theft, threat, vulnerabilityThreat actors chained Ivanti CSA vulnerabilities for RCE, credential theft & webshell deployment First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/cisa-fbi-warn-chained-attacks/
-
Chinese threat actors used two advanced exploit chains to hack Ivanti CSA
US agencies revealed Chinese threat actors used two advanced exploit chains to breach Ivanti Cloud Service Appliances (CSA). The US government’s cybersecurity and law enforcement revealed that Chinese threat actors used at least two sophisticated exploit chains to compromise Ivanti Cloud Service Appliances (CSA). A CISA and FBI published a joint advisory warning that Chinese hackers…
-
FBI/CISA Share Details on Ivanti Exploits Chains: What Network Defenders Need to Know
The US government shared exploit chains, IOCs and post-incident forensics data to help network defenders hunt for signs of Chinese hacking gangs. The post FBI/CISA Share Details on Ivanti Exploits Chains: What Network Defenders Need to Know appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/fbi-cisa-share-details-on-ivanti-exploits-chains-what-network-defenders-need-to-know/
-
CL-UNK-0979 Exploit Zero-Day Flaw in Ivanti Connect Secure to Gain Access to Networks
Palo Alto Networks has issued a detailed threat briefing on two critical vulnerabilities in Ivanti products”, CVE-2025-0282 and CVE-2025-0283. First seen on securityonline.info Jump to article: securityonline.info/cl-unk-0979-exploit-zero-day-flaw-in-ivanti-connect-secure-to-gain-access-to-networks/
-
US hits back against China’s Salt Typhoon group
Tags: attack, backdoor, china, cisa, ciso, communications, computer, control, crypto, cve, cyber, cyberattack, cybersecurity, defense, detection, disinformation, espionage, exploit, finance, government, group, infosec, infrastructure, intelligence, ivanti, law, malicious, mandiant, microsoft, network, north-korea, office, tactics, technology, theft, threat, tool, vpn, vulnerabilityThe US is hitting back against the threat group, dubbed Salt Typhoon by Microsoft, which is allegedly behind recent cyber attacks against American telecommunications providers, as part of a wider campaign against Chinese-based hacking.On Friday the Department of the Treasury’s Office of Foreign Assets Control (OFAC) said it is sanctioning Sichuan Juxinhe Network Technology, a…
-
PoC Exploit Released for Ivanti Connect Secure RCE Vulnerability
A serious security flaw has been identified in Ivanti Connect Secure, designated as CVE-2025-0282, which enables remote unauthenticated attackers to execute arbitrary code. As of January 8, 2025, Ivanti has acknowledged the existence of this stack-based buffer overflow vulnerability found in versions before22.7R2.5. This vulnerability is particularly concerning due to its high attack vector stemming from…
-
Critical Vulnerabilities CVE-2025-0282 and CVE-2025-0283 in Ivanti Connect Secure VPN Appliances
Summary On January 8, 2025, Ivanti disclosed two critical vulnerabilities, and, impacting Ivanti Connect Secure (ICS) VPN appliances. Notably, has been exploited in the wild First seen on research.kudelskisecurity.com Jump to article: research.kudelskisecurity.com/2025/01/09/critical-vulnerabilities-cve-2025-0282-and-cve-2025-0283-in-ivanti-connect-secure-vpn-appliances/
-
Ivanti VPN zero-day implicated in Nominet hack
First seen on scworld.com Jump to article: www.scworld.com/brief/ivanti-vpn-zero-day-implicated-in-nominet-hack
-
Ivanti Patches Actively-Exploited Connect Secure VPN Flaw
First seen on scworld.com Jump to article: www.scworld.com/brief/ivanti-patches-actively-exploited-connect-secure-vpn-flaw
-
Ivanti zero-day patching increases amid ongoing attacks
Recent scans conducted by the Shadowserver Foundation show many organizations have patched Ivanti instances vulnerable to CVE-2025-0282 over the last week. First seen on techtarget.com Jump to article: www.techtarget.com/searchsecurity/news/366617951/Ivanti-zero-day-patching-increases-amid-ongoing-attacks
-
UK Registry Nominet Breached Via Ivanti Zero-Day
The .uk registry Nominet has been breached by a recently disclosed zero-day vulnerability in Ivanti products First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/uk-registry-nominet-breached/
-
Ivanti zero-day has researchers scrambling
Threat hunters are on high alert as 900 Ivanti Connect Secure instances remain unpatched and vulnerable to exploitation, according to Shadowserver. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/ivanti-connect-secure-zero-day/737149/
-
Five Latest Updates On The 2025 Ivanti VPN Attacks
A domain registry provider is the first company to acknowledge a compromise related to the cyberattacks, which have exploited a critical vulnerability in Ivanti Connect Secure. First seen on crn.com Jump to article: www.crn.com/news/security/2025/5-latest-updates-on-the-2025-ivanti-vpn-attacks
-
UK domain registry Nominet breached via Ivanti zero-day
The number of internet-facing Ivanti Connect Secure instances vulnerable to attack via CVE-2025-0282 has fallen from 2,048 to 800 in the last four days, the Shadowserver … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/01/13/uk-domain-registry-nominet-breached-via-ivanti-zero-day-cve-2025-0282/
-
UK domain registry Nominet confirms breach via Ivanti zero-day
Nominet, the official .UK domain registry and one of the largest country code registries, has confirmed that its network was breached two weeks ago using an Ivanti VPN zero-day vulnerability. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/uk-domain-registry-nominet-confirms-breach-via-ivanti-zero-day-vulnerability/
-
Threat Actors Exploit a Critical Ivanti RCE Bug, Again
New year, same story. Despite Ivanti’s commitment to secure-by-design principles, threat actors, possibly the same ones as before, are exploiting its edge devices for the nth time. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/critical-ivanti-rce-bug

