Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Widespread Exploitation of Ivanti Connect Secure VPN Vulnerabilities
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Widespread Exploitation of Ivanti Connect Secure VPN Vulnerabilities

Highlights

  • Ivanti VPN's critical flaws exploited globally.

  • No official patch; agencies must act swiftly.

  • Research reveals multi-actor attack campaign.

NEWSLINKER
Last updated: 24 January, 2024 - 3:28 pm 3:28 pm
NEWSLINKER 1 year ago
Share
SHARE

Ivanti Connect Secure, a widely-used VPN solution, has been found to be susceptible to severe security flaws, specifically an authentication bypass and a command injection vulnerability. These vulnerabilities have been actively exploited by malicious entities and have been recognized by the Cybersecurity and Infrastructure Security Agency (CISA) as critical threats, necessitating immediate remediation by federal agencies.

Contents
Global Impact and Lack of Official PatchInsights from Volexity Research

Global Impact and Lack of Official Patch

The exploitation of these vulnerabilities has had a significant global impact, with thousands of internet-accessible Ivanti hosts identified, and over four hundred confirmed to have been compromised with backdoors due to credential theft. Ivanti has not yet released an official patch to address these vulnerabilities, instead providing interim solutions such as recovery steps, workarounds, and mitigation strategies. CISA has issued an emergency directive requiring federal agencies to address the vulnerabilities urgently, highlighting the seriousness due to the vulnerabilities’ widespread exposure and the complexity of mitigation efforts in the absence of a patch.

Insights from Volexity Research

Research conducted by Volexity has shed light on the tactics used by attackers, revealing modifications to a legitimate JavaScript component that resulted in the capture and exfiltration of user login details to a server controlled by the attackers. Further investigations uncovered numerous variants of callback methods employed in the compromised hosts, suggesting the involvement of multiple threat actors in these widespread exploitations.

Volexity and Censys, another research organization, have provided comprehensive reports detailing the nature of these vulnerabilities, their exploitation, and the extent of the compromise. These reports serve as a valuable resource for understanding the current threat landscape and formulating effective defenses.

In light of these findings, all Ivanti users are strongly encouraged to implement the mitigations recommended in Ivanti’s security advisory while awaiting the release of an official patch to protect their networks from potential cyberattacks.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Hackers Exploit Fake Salesforce Tools to Breach Corporate Data

Google Addresses 34 High-Severity Issues in Latest Android Security Update

CrowdStrike and Microsoft Tackle Threat Group Naming Confusion

MITRE CVE Crisis Prompts Calls for Proactive Cybersecurity Measures

FBI’s Cynthia Kaiser Joins Halcyon to Lead Ransomware Research

Share This Article
Facebook Twitter Copy Link Print
By NEWSLINKER
NEWS LINKER is your premier source for the latest in business, finance, science, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Dive deep into the world of cutting-edge developments, breakthroughs, market trends, and game-changing innovations..
Previous Article Effortless Connectivity: Syncing AirPods Across Devices
Next Article Understanding Elemental Advantages and Weapon Crafting in Palworld

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Nvidia Releases Game Ready Driver 576.66, Targets Crash Fixes
Computing
Lucid Targets Tesla Owners With $4,000 Trade-In Incentive
Electric Vehicle
HistoSonics Gains U.K. Access for Edison Tumor Therapy System
Robotics
Whale Dynamic and Noodoe Launch Integrated Autonomous Delivery Ecosystem
Robotics
AMD Moves Up Ryzen 10000 Processor Launch for Desktop PCs
Computing
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?