Lucene search

K
rapid7blogCaitlin CondonRAPID7BLOG:A65CC7D51BF22D1F65417F2DEBF7C7B4
HistoryJan 11, 2024 - 1:00 p.m.

Zero-Day Exploitation of Ivanti Connect Secure and Policy Secure Gateways

2024-01-1113:00:40
Caitlin Condon
blog.rapid7.com
41
ivanti
remote access
command execution
privilege escalation
zero-day vulnerabilities
authentication bypass
command injection
server-side request forgery
saml component
customer environment
attack
compromised
recovery guidance
security update

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

10 High

AI Score

Confidence

High

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.964 High

EPSS

Percentile

99.5%

Zero-Day Exploitation of Ivanti Connect Secure and Policy Secure Gateways

Information on these vulnerabilities has evolved considerably since this blog was originally published on January 11, 2024. Customers should refer to Ivanti’s two advisories, KB article, and recovery guidance for the latest updates.

On Wednesday, January 10, 2024, Ivanti disclosed two zero-day vulnerabilities affecting their Ivanti Connect Secure and Ivanti Policy Secure gateways. Security firm Volexity, who discovered the vulnerabilities, also published a blog with information on indicators of compromise and attacker behavior observed in the wild. In an attack Volexity investigated in December 2023, the two vulnerabilities were chained to gain initial access, deploy webshells, backdoor legitimate files, capture credentials and configuration data, and pivot further into the victim environment.

The two vulnerabilities from the initial advisory are:

  • CVE-2023-46805, a zero-day authentication bypass vulnerability in the web component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure that allows a remote attacker to access restricted resources by bypassing control checks.
  • CVE-2024-21887, a critical zero-day command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure that allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance. This vulnerability can be exploited over the internet

Rapid7 research has reproduced the attack leveraging CVE-2023-46895 and CVE-2024-21887; our team has a full technical analysis of the original exploit chain available in AttackerKB.

Two additional vulnerabilities were disclosed on January 31, 2024:

  • CVE-2024-21893, a zero-day server-side request forgery vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) and Ivanti Neurons for ZTA that allows an attacker to access certain restricted resources without authentication. According to Ivanti’s new advisory, CVE-2024-21893 has been exploited in a limited number of customer environments.
  • CVE-2024-21888, a privilege escalation vulnerability in the web component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) that allows a user to elevate privileges to that of an administrator.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) also published a bulletin on January 30 warning that threat actors are exploiting Ivanti vulnerabilities to capture credentials, drop webshells, and evade the original vendor-supplied mitigation. Both Volexity and Mandiant have released extensive descriptions of the attack and indicators of compromise — we strongly recommend reviewing their blogs. Volexity and CISA have both emphasized that adversaries have been observed trying to evade Ivanti’s ICS Integrity Checker Tool.

Rapid7 urges customers who use Ivanti Connect Secure or Policy Secure to take immediate steps to apply the vendor-supplied patch and look for indicators of compromise. CISA and others have also stressed the importance of immediate action and continuous threat hunting.

Counts of internet-exposed appliances vary widely depending on the query used. When CVE-2023-46805 and CVE-2024-21887 were disclosed, the following Shodan query identified roughly 7K devices on the public internet; looking for Ivanti’s welcome page alone more than doubles that number (but reduces accuracy): http.favicon.hash:-1439222863 html:"welcome.cgi?p=logo. Rapid7 Labs has observed both scanning activity and exploit attempts targeting our honeypots that emulate Ivanti Connect Secure appliances.

Mitigation guidance

_Important: _Ivanti has released additional guidance on attacker artifacts and recovery steps for impacted appliances since the information below was initially published. Customers should refer to Ivanti’s advisory, KB article, and recovery guidance as their sources of truth as new information continues to come to light.

  • All supported versions (9.x and 22.x) of Ivanti Connect Secure and Ivanti Policy Secure are vulnerable to CVE-2023-46805, CVE-2024-21887, CVE-2024-21893, and CVE-2024-21888.
  • Per Ivanti’s communications, all four CVEs are remediated with****a patch available as of January 31, 2024 via the standard download portal for Ivanti Connect Secure (versions 9.1R14.4, 9.1R17.2, 9.1R18.3, 22.4R2.2 and 22.5R1.1) and ZTA version 22.6R1.3. As of February 1, a patch addressing all known vulnerabilities is also available for Ivanti Connect Secure version 22.5R2.2 and Ivanti Policy Secure 22.5R1.1.
  • There is also a new mitigation available to address the new vulnerabilities. If you have applied the patch, you do not need to apply the mitigation.
  • Ivanti has recovery steps for impacted appliances here.
  • Updated patch timelines can be found here.

Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons customers should apply the vendor-supplied patch immediately and investigate their environments for signs of compromise. Ivanti advises customers using unsupported versions of the product to upgrade to a supported version before applying workarounds.

**Note:**Adversaries have been observed wiping logs and/or disabling logging on target devices. Administrators should ensure logging is enabled. Ivanti has a built-in integrity checker tool (ICT) that verifies the image on Ivanti Connect Secure and Ivanti Policy Secure appliances and looks for modified files. Ivanti is advising customers to use the externalversion of this tool to check the integrity of the ICS/IPS images, since Ivanti has seen adversaries “attempting to manipulate” the internal integrity checker tool.

**Note:**Per Ivanti’s advisory and KB article for CVE-2023-46805 and CVE-2024-21887, “Ivanti Neurons for ZTA gateways cannot be exploited when in production. If a gateway for this solution is generated and left unconnected to a ZTA controller, then there is a risk of exploitation on the generated gateway. Ivanti Neurons for Secure Access is not vulnerable to these CVEs; however, the gateways being managed are independently vulnerable to these CVEs.”

Rapid7 customers

InsightVM and Nexpose customers can assess their exposure to Ivanti Pulse Connect Secure CVE-2023-46805 and CVE-2024-21887 with unauthenticated vulnerability checks in the January 11 content release. Unauthenticated vulnerability checks are available for CVE-2023-46805 and CVE-2024-21887 in Ivanti Policy Secure as of January 12 (content version 1.1.3069).

Update February 1: InsightVM and Nexpose customers can assess their exposure to CVE-2024-21888 and CVE-2024-21893 in Ivanti Connect Secure with unauthenticated vulnerability checks in the February 1 content release (content version 1.1.3083). Further updates for Ivanti Policy Secure and coverage for Ivanti Neurons for ZTA are under investigation and may be available in the future.

InsightIDR and Managed Detection and Response customers have existing detection coverage through Rapid7’s expansive library of detection rules. Rapid7 recommends installing the Insight Agent on all applicable hosts to ensure visibility into suspicious processes and proper detection coverage. Below is a non-exhaustive list of detections that are deployed and will alert on post-exploitation behavior related to this zero-day vulnerability:

  • Suspicious Web Request - Possible Ivanti Exploit Activity
  • Suspicious Web Request - Possible Ivanti CVE-2023-46805 Exploitation

Blog Updates

January 12, 2024: Updated to include a reference to Mandiant’s blog on the attack, which includes indicators of compromise.

**January 16, 2024:**Updated to note that Rapid7 research has reproduced the exploit chain and has a full technical analysis available in AttackerKB.

**January 23, 2024:**Updated to reflect that Rapid7 Labs has detected attempted exploitation of Ivanti Connect Secure.

**January 24, 2024:**Updated with additional guidance from Ivanti on recovering compromised appliances. Customers should refer to Ivanti’s advisory, KB article, and recovery guidance as their sources of truth as new information continues to come to light.

**January 30, 2024:**Updated with note on patch delays from Ivanti.

January 31, 2024: Updated with new CVEs disclosed by Ivanti (CVE-2024-21893 and CVE-2024-21888), new Mandiant analysis, new CISA bulletin information, and new vendor-supplied patch information. Updated with detection information for InsightIDR and Rapid7 MDR customers. Updated to note that the InsightVM coverage development team is investigating the new CVEs.

February 1, 2024: Updated to note that InsightVM and Nexpose customers will be able to assess their exposure to CVE-2024-21888 and CVE-2024-21893 in Ivanti Connect Secure with unauthenticated vulnerability checks in today’s (February 1) content release (content version 1.1.3083).

**February 2, 2024:**Updated to reflect that as of February 1, Ivanti has indicated that a patch addressing all known vulnerabilities is also available for Ivanti Connect Secure version 22.5R2.2 and Ivanti Policy Secure 22.5R1.1.

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

10 High

AI Score

Confidence

High

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.964 High

EPSS

Percentile

99.5%