Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

CVE-2024-21893: Ivanti Policy vulnerability affected users in 2024

byKerem Gülen
February 7, 2024
in Cybersecurity

The Ivanti vulnerability 2024, identified as CVE-2024-21893 and affecting Ivanti Connect Secure and Ivanti Policy Secure, is currently facing widespread exploitation by numerous adversaries due to a server-side request forgery (SSRF) flaw.

CVE-2024-21893: Details of Ivanti vulnerability 2024

On January 31, 2024, Ivanti initially issued alerts concerning this vulnerability within the gateway’s SAML components, designating it as a zero-day due to its active, albeit limited, exploitation affecting a few clients. The breach of CVE-2024-21893 enables perpetrators to circumvent authentication measures and gain access to restricted areas on affected models (versions 9.x and 22.x).

Shadowserver, a threat monitoring entity, reports observing a surge in exploitation attempts, with 170 unique IP addresses targeting the Ivanti vulnerability 2024.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

We observed CVE-2024-21893 exploitation using '/dana-na/auth/saml-logout.cgi' on Feb 2nd hours before @Rapid7 posting & unsurprisingly lots to '/dana-ws/saml20.ws' after publication. This includes reverse shell attempts & other checks. To date, over 170 attacking IPs involved https://t.co/yUy4y2xCCz

— Shadowserver (@Shadowserver) February 4, 2024

The frequency and intensity of these attacks on CVE-2024-21893 surpass those observed with other Ivanti vulnerabilities that have recently been addressed or mitigated, highlighting a significant pivot in attacker strategy.

CVE-2024-21893: Ivanti vulnerability 2024 explained
The Ivanti vulnerability 2024, identified as CVE-2024-21893, is currently facing widespread exploitation by numerous adversaries (Image: Kerem Gülen/Midjourney)

The dissemination of a proof-of-concept (PoC) exploit by researchers at Rapid7 on February 2, 2024, has likely facilitated these assaults. However, Shadowserver’s findings suggest that assailants were employing comparable tactics to exploit the Ivanti vulnerability 2024 hours before the Rapid7 findings were made public, indicating that attackers had preemptively mastered the art of exploiting CVE-2024-21893 to gain unfettered, unauthenticated access to susceptible Ivanti endpoints.

ShadowServer’s analysis reveals that approximately 22,500 Ivanti Connect Secure devices are currently accessible online, though the exact number vulnerable to this specific flaw remains uncertain.

A complex security dilemma has unfolded with the revelation of CVE-2024-21893, coinciding with the issuance of security patches addressing two additional zero-day vulnerabilities affecting the same Ivanti products: CVE-2023-46805 and CVE-2024-21887, initially identified by Ivanti on January 10, 2024. Ivanti promptly shared provisional countermeasures following their discovery. These vulnerabilities have been exploited by the Chinese espionage entity known as UTA0178/UNC5221, utilizing them to implant webshells and backdoors within compromised systems. The height of this infiltration effort saw approximately 1,700 devices affected in mid-January.

CVE-2024-21893: Ivanti vulnerability 2024 explained
Vulnerabilities like CVE-2024-21893 expose the intricate challenges that organizations face in safeguarding digital infrastructures (Image: Kerem Gülen/Midjourney)

Despite Ivanti’s early intervention attempts, adversaries successfully navigated around these initial safeguards, even tampering with the devices’ configuration files. This led Ivanti to delay the deployment of its firmware updates, originally slated for January 22, to confront this advanced menace effectively.

Ivanti Policy Secure VPN appliances affected

Amidst the ongoing exploitation of these severe zero-day vulnerabilities, compounded by the absence of robust countermeasures and updates for some versions of the impacted products, the U.S. Cybersecurity & Infrastructure Security Agency (CISA) has mandated federal agencies to sever connections with all Ivanti Policy Secure VPN appliances affected. Reconnection is permitted solely for devices that have undergone a factory reset and have been updated to the most current firmware release. Nonetheless, older versions that remain susceptible continue to lack a corrective update.


Everything you need to know about Equifax data breach settlement


This directive is also advised for private sector entities, although compliance is not obligatory. As such, organizations are urged to meticulously assess the security posture of their Ivanti solutions and the overall reliability of their network environments.

Vulnerabilities like CVE-2024-21893 expose the intricate challenges that organizations face in safeguarding digital infrastructures. The widespread exploitation of the Ivanti vulnerability 2024 underscores the critical importance of swift, proactive measures to patch known security gaps and reinforce defenses. It is a stark reminder for entities across all sectors to remain vigilant, continuously monitor their systems for unusual activities, and adhere to best practices in cybersecurity hygiene. As adversaries evolve in sophistication, so too must our strategies for defense, ensuring the integrity and resilience of our digital ecosystems against the ever-present threat of cyber exploitation.


Featured image credit: Kerem Gülen/Midjourney

Tags: Data Breach

Related Posts

Researchers warn of 100K-node botnet exploiting Remote Desktop vulnerabilities

Researchers warn of 100K-node botnet exploiting Remote Desktop vulnerabilities

October 14, 2025
Microsoft Edge restricts IE mode after zero-day exploit

Microsoft Edge restricts IE mode after zero-day exploit

October 14, 2025
Verizon down: Latest Verizon outage map for service issues

Verizon down: Latest Verizon outage map for service issues

October 10, 2025
A critical Oracle zero-day flaw is being actively abused by hackers

A critical Oracle zero-day flaw is being actively abused by hackers

October 10, 2025
The Windows 10 doomsday clock is ticking for 500 million users

The Windows 10 doomsday clock is ticking for 500 million users

October 10, 2025
Hack an iPhone and Apple will pay you up to  million

Hack an iPhone and Apple will pay you up to $5 million

October 10, 2025

LATEST NEWS

NVTS stock skyrockets 27%: What is the correlation between Navitas and Nvidia

ChatGPT Android beta includes direct messaging

HP revealed a “League of Legends laptop” for $1,999

Samsung is not done with Bixby after all

Slack’s next-gen Slackbot aims to give “every employee AI superpowers”

Google integrates its viral Nano Banana AI into everyday tools

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.