CVE-2024-38655

7.2 HIGH

📋 TL;DR

This vulnerability allows remote authenticated attackers with admin privileges to execute arbitrary code on Ivanti Connect Secure and Policy Secure gateways through argument injection. Organizations using affected versions of these products are at risk of complete system compromise.

💻 Affected Systems

Products:
  • Ivanti Connect Secure
  • Ivanti Policy Secure
Versions: Connect Secure: before 22.7R2.1 and 9.1R18.9; Policy Secure: before 22.7R1.1 and 9.1R18.9
Operating Systems: Ivanti's custom OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin privileges for exploitation. All default configurations of affected versions are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise leading to data exfiltration, lateral movement, ransomware deployment, and persistent backdoor installation.

🟠

Likely Case

Attackers gain complete control over the gateway, enabling credential theft, VPN session hijacking, and access to internal networks.

🟢

If Mitigated

Limited impact if proper network segmentation, admin account controls, and monitoring are in place to detect exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin credentials but is straightforward once authenticated. Similar Ivanti vulnerabilities have been actively exploited in the wild.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Connect Secure: 22.7R2.1 or 9.1R18.9; Policy Secure: 22.7R1.1 or 9.1R18.9

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Ivanti support portal. 2. Backup current configuration. 3. Apply patch via admin interface. 4. Reboot the appliance. 5. Verify successful update.

🔧 Temporary Workarounds

Restrict Admin Access

all

Limit admin account access to trusted IP addresses only and implement multi-factor authentication.

Network Segmentation

all

Isolate Ivanti appliances in dedicated network segments with strict firewall rules.

🧯 If You Can't Patch

  • Implement strict network access controls to limit admin interface exposure
  • Enable detailed logging and monitoring for suspicious admin activities

🔍 How to Verify

Check if Vulnerable:

Check version in admin interface: System > Maintenance > Version Information

Check Version:

ssh admin@ivanti-appliance 'show version'

Verify Fix Applied:

Verify version is equal to or higher than patched versions listed in affected systems

📡 Detection & Monitoring

Log Indicators:

  • Unusual admin login patterns
  • Unexpected command execution in system logs
  • Multiple failed admin login attempts

Network Indicators:

  • Unusual outbound connections from Ivanti appliance
  • Suspicious traffic patterns to/from admin interface

SIEM Query:

source="ivanti*" AND (event_type="admin_login" OR event_type="command_execution") | stats count by src_ip, user

🔗 References

📤 Share & Export