[February 2024 Vulnerability Report] Ivanti Connect Secure & Policy Secure Vulnerability | Cloud SECaaS platform AIONCLOUD

AIONCLOUD BLOG

Share information related to AIONCLOUD !

Back to BLOG Main

[February 2024 Vulnerability Report] Ivanti Connect Secure & Policy Secure Vulnerability

Ivanti Connect Secure and Policy Secure Multiple Vulnerability


1. Overview

Ivanti's Connect Secure and Policy Secure are SSL VPN solutions and IPS solutions, and we have analyzed CVE-2023-46805, CVE-2024-21887, CVE-2024-21888, and CVE-2024-21893 that were recently discovered in these platforms.


2. Attack Types

In January 2024, Ivanti released patches for vulnerabilities found in its Connect Secure and Policy Secure solutions.

The first patch, released on January 10, patched two vulnerabilities, CVE-2023-46805 and CVE-2024-21887, which were used to gain administrative privileges by bypassing the authentication process and upload a web shell to execute arbitrary commands.

1) CVE-2023-46805

This vulnerability is an authentication bypass vulnerability in Ivanti Connect Secure and Ivant Policy Secure solutions, where certain APIs use the ../ syntax to bypass the authentication process, allowing access and execution of the system's administrative functions.

According to Rapid7's analysis report, internal Python REST services can be accessed via the ../ syntax, taking advantage of the fact that APIs starting with /api/v1/totp/user-backup-code are not subject to authentication.

2) CVE-2024-21887

The vulnerability is an RCE vulnerability in Ivanti Connect Secure and Ivant Policy Secure solutions that could allow an authenticated attacker to send a request with arbitrary injected commands to dump memory, hijack backup files, etc.

This vulnerability, in conjunction with CVE-2023-46805, allows an authenticated attacker to bypass the authentication process to access the Python REST APIs license/keys-status/, /system/maintenance/archiving/cloud-server-test-connection API, which allows command injection, and send Python malicious code to execute commands in the arm.

image.png

3) CVE-2024-21888

On January 31, we patched two more vulnerabilities: CVE-2024-21888, a privilege escalation vulnerability that promoted a regular user to administrator privileges, and CVE-2024-21893, an SSRF vulnerability in a service that handles SAML requests.

Of these, CVE-2024-21888 is a privilege escalation vulnerability in a web component that occurred in Ivanti Connect Secure and Ivant Policy Secure solutions that could allow an ordinary user to be promoted to an administrator, but no details about the vulnerability have been released as no attacks have been reported to date.

4) CVE-2024-21893

This is an SSRF vulnerability in the Ivanti Connect Secure and Ivant Policy Secure solutions, where some of the endpoints of a service that handles SOAP-based SAML requests within those solutions have no authentication process, allowing an SSRF attack to be carried out by sending crafted XML data to those endpoints.

According to Rapid7, the endpoints of the service that handles SOAP-based SAML requests are /dana-ws/saml.ws``/dana-ws/saml20.ws``/dana-ws/samlecp.ws, of which the /dana-ws/saml20.ws endpoint has no authentication process, allowing SSRF attacks.

image.png


3. Countermeasures

Ivanti has released patches for these vulnerabilities, so you can respond by updating your Ivanti Connect Secure and Ivanti Policy Secure solutions to the latest versions that are not past EOL.

For CVE-2023-46805 and CVE-2024-21887, our AIWAF products are detecting attack syntax that exploits these vulnerabilities with the "Directory Access Detection" policy and the "Command Injection 1" pattern, and for CVE-2024-21893, the "Ivanti Connect Secure and Policy Secure SSRF" pattern included in the February 2024 pattern update.

For CVE-2024-21888, we are continuing to monitor as information about the attack is not yet publicly available.


4. Conclusion

Recently, various vulnerabilities have been discovered and reported against Ivanti's products and solutions, and most of them are easily exploitable, so it is necessary to update to the latest version as soon as possible.

In our AIWAF products, we have developed patterns for vulnerabilities in Ivanti Connect Secure and Policy Secure, and we will continue to respond quickly to related vulnerabilities as they are discovered.


5. References

Scroll Up