Tuesday, July 2, 2024

New Ivanti Auth Bypass Flaw Impacts Join Safe and ZTA Gateways

Feb 09, 2024NewsroomVulnerability / Zero Day

Ivanti Vulnerability

Ivanti has alerted prospects of yet one more high-severity safety flaw in its Join Safe, Coverage Safe, and ZTA gateway units that might permit attackers to bypass authentication.

The problem, tracked as CVE-2024-22024, is rated 8.3 out of 10 on the CVSS scoring system.

“An XML exterior entity or XXE vulnerability within the SAML element of Ivanti Join Safe (9.x, 22.x), Ivanti Coverage Safe (9.x, 22.x) and ZTA gateways which permits an attacker to entry sure restricted assets with out authentication,” the corporate mentioned in an advisory.

The corporate mentioned it found the flaw throughout an inside evaluate as a part of its ongoing investigation into a number of safety weaknesses within the merchandise which have come to gentle for the reason that begin of the yr, together with CVE-2023-46805, CVE-2024-21887, CVE-2024-21888, and CVE-2024-21893.

Cybersecurity

CVE-2024-22024 impacts the next variations of the merchandise –

  • Ivanti Join Safe (variations 9.1R14.4, 9.1R17.2, 9.1R18.3, 22.4R2.2, and 22.5R1.1)
  • Ivanti Coverage Safe (model 22.5R1.1)
  • ZTA (model 22.6R1.3)

Patches for the bug can be found in Join Safe variations 9.1R14.5, 9.1R17.3, 9.1R18.4, 22.4R2.3, 22.5R1.2, 22.5R2.3, and 22.6R2.2; Coverage Safe variations 9.1R17.3, 9.1R18.4, and 22.5R1.2; and ZTA variations 22.5R1.6, 22.6R1.5, and 22.6R1.7.

Ivanti mentioned there is no such thing as a proof of lively exploitation of the flaw, however with CVE-2023-46805, CVE-2024-21887, and CVE-2024-21893 coming beneath broad abuse, it is crucial that customers transfer rapidly to use the newest fixes.

Replace

Cybersecurity agency watchTowr, which mentioned it disclosed CVE-2024-22024 to Ivanti in early February 2024, famous the problem stems from an incorrect repair for CVE-2024-21893 that was launched within the newest model of the software program.

“XXE is an introduction to quite a lot of impacts: DOS, Native File Learn, and SSRF,” it mentioned. “The affect, plainly, of the SSRF relies on what protocols can be found for utilization.”

Discovered this text attention-grabbing? Comply with us on Twitter and LinkedIn to learn extra unique content material we submit.



Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles