CVE-2024-9844
📋 TL;DR
This vulnerability allows authenticated remote attackers to bypass security restrictions in Ivanti Connect Secure's Secure Application Manager. It affects organizations using Ivanti Connect Secure versions before 22.7R2.4. Attackers must have valid credentials to exploit this weakness.
💻 Affected Systems
- Ivanti Connect Secure
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Authenticated attackers could bypass application controls to access restricted resources, potentially leading to data exfiltration or lateral movement within the network.
Likely Case
Privileged users or compromised accounts could bypass intended security controls to access applications or resources they shouldn't have access to.
If Mitigated
With proper access controls and monitoring, impact would be limited to unauthorized access to specific applications rather than full system compromise.
🎯 Exploit Status
Exploitation requires authenticated access. The bypass mechanism appears to be straightforward once authenticated.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 22.7R2.4
Vendor Advisory: https://forums.ivanti.com/s/article/December-2024-Security-Advisory-Ivanti-Connect-Secure-ICS-and-Ivanti-Policy-Secure-IPS-Multiple-CVEs
Restart Required: Yes
Instructions:
1. Download patch from Ivanti support portal. 2. Backup current configuration. 3. Apply patch via admin interface. 4. Restart appliance. 5. Verify version shows 22.7R2.4 or later.
🔧 Temporary Workarounds
Restrict Access Controls
allTighten access controls and implement additional authentication layers for sensitive applications
Network Segmentation
allSegment network to limit access to Secure Application Manager from untrusted networks
🧯 If You Can't Patch
- Implement strict access controls and monitor for unusual authentication patterns
- Deploy network-based controls to restrict access to the Secure Application Manager interface
🔍 How to Verify
Check if Vulnerable:
Check version in admin interface: System > Maintenance > Version Information
Check Version:
ssh admin@<appliance-ip> show version
Verify Fix Applied:
Verify version shows 22.7R2.4 or later in admin interface
📡 Detection & Monitoring
Log Indicators:
- Unusual authentication patterns to Secure Application Manager
- Access attempts to restricted applications from unexpected user accounts
Network Indicators:
- Unusual traffic patterns to/from Secure Application Manager ports
- Authentication requests followed by unexpected application access
SIEM Query:
source="ivanti-connect" AND (event_type="auth_success" AND app="secure_app_manager") AND (resource_access="restricted_application")