Skip to content

Commit

Permalink
Create 20240904001-Ivanti-Critical-Vulnerability-PoC-Published.md (wa…
Browse files Browse the repository at this point in the history
…gov#970)

* Create 20240904001-Ivanti-Critical-Vulnerability-PoC-Published.md

Ivanti Critical Vulnerability PoC Published - 20240904001

* Format markdown docs

* Update 20240904001

Updated content to match the Template.

* Format markdown docs

---------

Co-authored-by: jasonkasih <jasonkasih@users.noreply.github.com>
Co-authored-by: JadonWill <117053393+JadonWill@users.noreply.github.com>
Co-authored-by: JadonWill <JadonWill@users.noreply.github.com>
  • Loading branch information
4 people committed Sep 4, 2024
1 parent 877ed98 commit 647e27e
Showing 1 changed file with 22 additions and 0 deletions.
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
# Ivanti Critical Vulnerability PoC Published - 20240904001

## Overview

Ivanti released updates for Ivanti Virtual Traffic Manager (vTM) which addressed a critical vulnerability. Successful exploitation could lead to authentication bypass and creation of an administrator user.

## What is vulnerable?

| Product(s) Affected | Version(s) | CVE # | CVSS v4/v3 | Severity |
| ------------------------------ | ------------------------------------------------------------------------------------------------------------------------- | --------------------------------------------------------------- | ---------- | -------- |
| Ivanti Virtual Traffic Manager | 22.2 \< 22.2R1 <br> 22.3 \< 22.3R3 <br>22.3R2 \< 22.3R3 <br> 22.5R1 \< 22.5R2 <br> 22.6R1 \< 22.6R2 <br> 22.7R1 \< 22.7R2 | [CVE-2024-7593](https://nvd.nist.gov/vuln/detail/CVE-2024-7593) | 9.8 | Critical |

## What has been observed?

Ivanti is not aware of any customers being exploited by this vulnerability at the time of disclosure, however a Proof of Concept is publicly available.
There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.

## Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of *48 hours...* (refer [Patch Management](../guidelines/patch-management.md)):

- Vendor article: <https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Virtual-Traffic-Manager-vTM-CVE-2024-7593?language=en_US>

0 comments on commit 647e27e

Please sign in to comment.