Teaming up with... AVIVA

Welcome to the UKGI weekly regulation update service for Aviva ABC brokers

We hope you find the Updates useful. If you are
interested in subscribing to our affordable
ABC compliance support package, please
email us at ABC@ukgigroup.com or
call UKGI on our dedicated ABC
contact line 01925 767893.

NCSC asks organisations to take action if they use Ivanti Security products

Link(s):Exploitation of vulnerabilities affecting Ivanti Connect… – NCSC.GOV.UK
CVE-2023-46805 (Authentication Bypass) & CVE-2024-21887 (Command Injection) for Ivanti Connect Secure and Ivanti Policy Secure Gateways

Context

The NCSC is encouraging organisations to take immediate action to mitigate vulnerabilities affecting Ivanti Connect Secure (ICS) and Ivanti Policy Secure (IPS) gateways (CVE-2023-46805, CVE-2024-21887, CVE-2024-21888 and CVE-2024-21893), and follow the latest vendor advice.

Key points to note and next actions

The NCSC informs that Ivanti has published an updated advisory detailing four vulnerabilities affecting Connect Secure and Policy Secure gateways.

Ivanti is aware of active exploitation of some of these vulnerabilities.

  • CVE-2023-46085 — an authentication bypass vulnerability in the web component of ICS (9.x, 22.x) and IPS which allows a remote attacker to access restricted resources by bypassing control checks.
  • CVE-2024-21887 — a command injection vulnerability in web components of ICS (9.x, 22.x) and IPS which allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.
  • If CVE-2024-21887 is used in conjunction with CVE-2023-46805, exploitation doesn’t require authentication and enables a threat actor to craft malicious requests and execute arbitrary commands on the system.
  • CVE-2024-21888 — a privilege escalation vulnerability in the web component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows a user to elevate privileges to that of an administrator.
  • CVE-2024-21893 — a server-side request forgery vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) and Ivanti Neurons for ZTA allows an attacker to access certain restricted resources without authentication.

The NCSC will continue to monitor for any impact of these vulnerabilities on UK organisations.