CVE-2024-29211

4.7 MEDIUM

📋 TL;DR

A race condition vulnerability in Ivanti Secure Access Client allows local authenticated attackers to modify sensitive configuration files. This could lead to privilege escalation or unauthorized access to protected resources. Only affects systems running Ivanti Secure Access Client versions before 22.7R4.

💻 Affected Systems

Products:
  • Ivanti Secure Access Client
Versions: All versions before 22.7R4
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local authenticated user access. Race condition occurs during configuration file operations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains administrative privileges, modifies VPN configurations to intercept traffic, or installs persistent backdoors.

🟠

Likely Case

Local user elevates privileges to modify VPN settings or access restricted network resources.

🟢

If Mitigated

Minimal impact with proper access controls, file permissions, and monitoring in place.

🌐 Internet-Facing: LOW - Requires local authenticated access, not directly exploitable over internet.
🏢 Internal Only: MEDIUM - Requires local authenticated access, but insider threats or compromised accounts could exploit.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Race conditions require precise timing and local access. No public exploits known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 22.7R4

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs

Restart Required: Yes

Instructions:

1. Download Ivanti Secure Access Client version 22.7R4 from official Ivanti portal. 2. Uninstall previous version. 3. Install new version. 4. Restart system.

🔧 Temporary Workarounds

Restrict local user access

all

Limit local user accounts to only trusted personnel and implement least privilege principles.

Monitor configuration file changes

all

Implement file integrity monitoring on Ivanti Secure Access Client configuration directories.

🧯 If You Can't Patch

  • Implement strict access controls to limit local user privileges.
  • Deploy file integrity monitoring to detect unauthorized configuration changes.

🔍 How to Verify

Check if Vulnerable:

Check Ivanti Secure Access Client version in application settings or via command line: On Windows: 'C:\Program Files\Ivanti\Secure Access Client\isac.exe --version'

Check Version:

On Windows: 'C:\Program Files\Ivanti\Secure Access Client\isac.exe --version'

Verify Fix Applied:

Verify installed version is 22.7R4 or later using the same version check command.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected modifications to Ivanti configuration files
  • Multiple rapid file access attempts to configuration files
  • Unauthorized user accessing Ivanti directories

Network Indicators:

  • Unusual VPN connection patterns
  • Unexpected changes to VPN tunnel configurations

SIEM Query:

source="windows_security" EventID=4663 ObjectName="*Ivanti*" OR source="sysmon" EventID=11 TargetFilename="*Ivanti*config*"

🔗 References

📤 Share & Export