• Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

Ivanti Connect Secure and Policy Secure Exploit - CVE-2024-21887

Risk Factors

Connect Secure devices are typically internet-facing and this vulnerability has been exploited by threat actors. Public exploit code is available, enabling unauthenticated attackers to chain together vulnerabilities and gain full administrator privileges. An attacker can gain control of Connect Secure and Pulse Secure Gateway devices to launch additional attacks on the network.

Kill Chain

Exploitation

Risk Score

87

Detection diagram
Next in Exploitation: Ivanti Connect Secure and Policy Secure Exploit Attempt - CVE-2024-21887

Attack Background

The web components of Ivanti Connect Secure VPN and Policy Secure Gateway devices have a command injection vulnerability (CVE-2024-21887). An attacker, either authenticated or unauthenticated, can send a specially crafted HTTP request to run a malicious payload on the victim. If the attacker is unauthenticated, CVE-2024-21887 will typically be chained with another authentication bypass vulnerability (CVE-202-46805).

Mitigation Options

Install relevant patches for affected versions

MITRE ATT&CK ID

What else can RevealX do for you?