PoC exploit for exploited Ivanti Cloud Services Appliance flaw released (CVE-2024-8190)
CVE-2024-8190, an OS command injection vulnerability in Ivanti Cloud Services Appliance (CSA) v4.6, is under active exploitation.
cve-2024-8190/ivanti-cloud-services-appliance-os-command-injection-vulnerability/" title="Ivanti Cloud Services Appliance OS Command Injection Vulnerability">cve-2024-8190="" "="" title="CVE-2024-8190">CVE-2024-8190" title="Ivanti">
Details about the attacks are still unknown, but there may be more in the near future: Horizon3.ai researchers have published their analysis of the flaw and a PoC exploit for it.
About CVE-2024-8190
CVE-2024-8190 is a command injection vulnerability that can only be exploited if the attacker manages to log into the appliance’s admin login page first. According to Horizon3.ai researchers, that might not be a great hurdle in some cases.
“Successful exploitation could lead to unauthorized access to the device running the CSA. Dual-homed CSA configurations with eth0 as an internal network, as recommended by Ivanti, are at a significantly reduced risk of exploitation,” Ivanti explained in the security advisory.
But, unfortunately, not everyone follows recommendations.
“Users that accidentally swap the interfaces, or simply only have one interface configured, would expose the console to the internet,” Horizon3.ai’s Zach Hanley explained.
And while users are required to change the default login credentials (username: admin, password: admin) when logging in for the first time, a new password might not be strong enough to counter the disadvantage presented by non-existent rate limiting for login attempts.
“We theorize that most likely users who have been exploited have never logged in to the appliance, or due to lack of rate limiting may have had poor password hygiene and had weaker passwords,” Hanley added.
What to do?
CVE-2024-8190 affects only CSA v4.6 before Patch 519, which was released last week.
But Ivanti and CISA urge users to update to v5.0, which is not affected because the vulnerable functionality was removed. Also, v5.0 is the only one that’s still supported – v4.6 has reached end-of-life, and will not be receiving any more fixes or patches.
Ivanti says that “a limited number of customers” have been exploited. Those who suspect of having been victimized should review the CSA for modified or newly added administrative users.
“While inconsistent, some attempts may show up in the broker logs which are local to the system. We also recommend reviewing EDR alerts, if you have installed EDR or other security tools on your CSA,” the company advised.
Horizon3.ai has shared indicators of compromise that may be found in logs.
source: HelpNetSecurity
Free security scan for your website
Top News:
Attackers are exploiting 2 zero-days in Palo Alto Networks firewalls (CVE-2024-0012, CVE-2024-9474)
November 18, 2024CWE top 25 most dangerous software weaknesses
November 21, 2024Chinese APT Gelsemium Targets Linux Systems with New WolfsBane Backdoor
November 21, 2024Hackers now use AppDomain Injection to drop CobaltStrike beacons
August 24, 2024