Ivanti Virtual Traffic Manager Flaw Let Hackers Create Rogue Admin Accounts

by Esmeralda McKenzie
Ivanti Virtual Traffic Manager Flaw Let Hackers Create Rogue Admin Accounts

Ivanti Virtual Traffic Manager Flaw Let Hackers Create Rogue Admin Accounts

Ivanti Virtual Web vow visitors Supervisor Flaw Let Hackers Attach Rogue Admin Accounts

Ivanti Virtual Web vow visitors Supervisor has been realized with a important vulnerability which became associated to authentication bypass. This vulnerability has been assigned with CVE-2024-7593 and the severity became given as 9.8 (Serious).

Alternatively, Ivanti has patched this vulnerability and launched a security advisory to address it.

Ivanti confirmed that there is now not any evidence of active exploitation of this vulnerability, and a proof of belief for it is publicly accessible.

Ivanti Virtual Web vow visitors Supervisor Vulnerability

This vulnerability lets in an unauthenticated remote threat actor to circumvent the admin panel authentication and form malicious actions.

Extra, a threat actor may perhaps well originate an administrator tale on the susceptible Ivanti cases as a backdoor.

google

This assert vulnerability exists attributable to the incorrect implementation of the authentication algorithm in Ivanti vTM. On the opposite hand, this vulnerability exists in all versions of Ivanti vTM varied than versions 22.2R1 or 22.7R2.

Ivanti prospects who comprise their administration interface interior an interior network or Non-public IP comprise lowered assault floor.

Ivanti also advises its users to ban salvage entry to to the administration interface and make sure they’re placed on a non-public IP with restricted salvage entry to.

Additionally, Ivanti users are knowledgeable to enhance their Ivanti cases with essentially the most in trend accessible patch 22.2R1 (launched 26 March 2024) or 22.7R2 (launched 20 Would possibly perhaps 2024) for fixing this vulnerability.

Product Title Affected Version(s) Resolved Version(s) Patch Availability
Ivanti Virtual Web vow visitors Supervisor 22.2 22.2R1 Available within the market
Ivanti Virtual Web vow visitors Supervisor 22.3 22.3R3 Week of August 19th
Ivanti Virtual Web vow visitors Supervisor 22.3R2 22.3R3 Week of August 19th
Ivanti Virtual Web vow visitors Supervisor 22.5R1 22.5R2 Week of August 19th
Ivanti Virtual Web vow visitors Supervisor 22.6R1 22.6R2 Week of August 19th
Ivanti Virtual Web vow visitors Supervisor 22.7R1 22.7R2 Available within the market
Affected model (Provide: Ivanti)

Workaround

As a workaround for this vulnerability, Ivanti instructs their users to comply with the below steps to limit Admin salvage entry to to the Administration interface interior on the network through non-public or corporate network. The steps are as follows:

  • Within the VTM server, coast to Machine > Safety then click the drop down for the Administration IP Contend with and Admin Server Port part
  • Click on the “bindip“, decide the Administration Interface IP Contend with.
  • As an quite loads of, users may perhaps well exercise the environment without delay above the “bindip” environment to ban salvage entry to to depended on IP addresses, extra restricting who can salvage entry to the interface.
rtaImage
Provide ; Ivanti

To study if the cases are terminated, they can overview the “Audit Logs Output” to gape if an admin particular person is added.

Users are knowledgeable to abet all of the cases up up to now to essentially the most in trend model to stay the exploitation of this vulnerability. Ivanti also checklist Discontinuance of Engineering and Discontinuance of Toughen agenda for Ivanti vTM, it’ll be realized right here.

“We’re now not acutely conscious of any prospects being exploited by these vulnerabilities old to public disclosure. These vulnerabilities were disclosed through our to blame disclosure program,” Ivanti added.

googlenews

Source credit : cybersecuritynews.com

Related Posts