CyberSecurity updates
Updated: 2024-10-30 11:46:54 Pacfic


horizon3.ai
Ivanti CSA Vulnerability Actively Exploited: OS Command Injection Vulnerability Requires Urgent Action - 16d

A critical vulnerability (CVE-2024-8190) in Ivanti’s Cloud Services Appliance (CSA) has been actively exploited by malicious actors. This vulnerability allows attackers to gain unauthorized access and control of affected systems via OS command injection. The flaw specifically impacts older versions of CSA, including 4.6 (all versions before patch 519). The use of older versions of products can cause a lot of problems, as attackers can utilize old exploits against vulnerable products and systems. The urgency of this situation highlights the need for organizations to update their CSA software to the latest patched version or, if they have versions older than CSA 5.0, to consider adopting a newer product which has been properly secured. CISA advises that affected users immediately upgrade to CSA version 5.0, or a newer version.

informationsecuritybuzz.com
Ivanti Cloud Services Appliance Vulnerability (CVE-2024-8963) Actively Exploited by Threat Actors: CISA Catalog Entry, Urgent Patching and Mitigation Required - 8d

A critical vulnerability (CVE-2024-8963) affecting the Ivanti Cloud Services Appliance (CSA) has been identified as being actively exploited in the wild. This vulnerability allows attackers to bypass administrative controls, potentially enabling them to gain unauthorized access and execute commands on the system. CISA has added this vulnerability to its Known Exploited Vulnerabilities Catalog, urging organizations to prioritize remediation efforts. Organizations that utilize the Ivanti CSA product should immediately apply the available patches and follow Ivanti’s security advisories to mitigate the risk of exploitation. Continuous monitoring and threat intelligence are necessary to stay informed about potential threats and vulnerabilities affecting your IT infrastructure.


This site is an experimental news aggregator using feeds I personally follow. You can reach me using contacts documented at my website here (https://royans.net/) if you have feedback. You can also find FlagThis at Mastodon.