CVE-2024-38657

4.9 MEDIUM

📋 TL;DR

This vulnerability allows remote authenticated attackers with admin privileges to write arbitrary files by controlling file names in Ivanti Connect Secure and Policy Secure. Attackers could potentially overwrite critical system files or deploy malicious content. Only systems running vulnerable versions of these Ivanti products are affected.

💻 Affected Systems

Products:
  • Ivanti Connect Secure
  • Ivanti Policy Secure
Versions: Connect Secure before 22.7R2.4, Policy Secure before 22.7R1.3
Operating Systems: All supported platforms for these products
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin privileges to exploit. All default configurations of affected versions are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through arbitrary file write leading to remote code execution, configuration modification, or denial of service by overwriting critical system files.

🟠

Likely Case

Privilege escalation, persistence mechanisms, or data manipulation through controlled file writes in accessible directories.

🟢

If Mitigated

Limited impact with proper admin credential protection and file system permissions restricting write locations.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin credentials but is technically simple once authenticated. No public exploit code identified at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Connect Secure 22.7R2.4 or later, Policy Secure 22.7R1.3 or later

Vendor Advisory: https://forums.ivanti.com/s/article/February-Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-and-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Ivanti support portal. 2. Backup current configuration. 3. Apply the patch following Ivanti's upgrade documentation. 4. Restart the appliance. 5. Verify successful upgrade and functionality.

🔧 Temporary Workarounds

Restrict Admin Access

all

Limit administrative access to only trusted IP addresses and users. Implement multi-factor authentication for admin accounts.

File System Monitoring

all

Monitor for unexpected file writes in system directories using file integrity monitoring tools.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable appliances from critical systems.
  • Enforce principle of least privilege for admin accounts and implement comprehensive logging of admin activities.

🔍 How to Verify

Check if Vulnerable:

Check the appliance version via web admin interface or CLI. For Connect Secure: version must be 22.7R2.4 or higher. For Policy Secure: version must be 22.7R1.3 or higher.

Check Version:

From CLI: show version or via web interface: System > Maintenance > Version Information

Verify Fix Applied:

Verify the version number after patching and test admin file upload functionality with controlled test cases.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file write operations by admin users
  • Multiple failed file upload attempts followed by successful writes
  • Admin login from unexpected IP addresses

Network Indicators:

  • Unusual admin API calls to file upload endpoints
  • Increased traffic to admin interfaces from new sources

SIEM Query:

source="ivanti_appliance" AND (event_type="file_write" OR event_type="admin_upload") AND user_role="admin"

🔗 References

📤 Share & Export