CVE-2024-9844

7.1 HIGH

📋 TL;DR

This vulnerability allows authenticated remote attackers to bypass security restrictions in Ivanti Connect Secure's Secure Application Manager. It affects organizations using Ivanti Connect Secure versions before 22.7R2.4. Attackers must have valid credentials to exploit this weakness.

💻 Affected Systems

Products:
  • Ivanti Connect Secure
Versions: All versions before 22.7R2.4
Operating Systems: Appliance-based (Linux underlying OS)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Secure Application Manager component. Requires authenticated access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Authenticated attackers could bypass application controls to access restricted resources, potentially leading to data exfiltration or lateral movement within the network.

🟠

Likely Case

Privileged users or compromised accounts could bypass intended security controls to access applications or resources they shouldn't have access to.

🟢

If Mitigated

With proper access controls and monitoring, impact would be limited to unauthorized access to specific applications rather than full system compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access. The bypass mechanism appears to be straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 22.7R2.4

Vendor Advisory: https://forums.ivanti.com/s/article/December-2024-Security-Advisory-Ivanti-Connect-Secure-ICS-and-Ivanti-Policy-Secure-IPS-Multiple-CVEs

Restart Required: Yes

Instructions:

1. Download patch from Ivanti support portal. 2. Backup current configuration. 3. Apply patch via admin interface. 4. Restart appliance. 5. Verify version shows 22.7R2.4 or later.

🔧 Temporary Workarounds

Restrict Access Controls

all

Tighten access controls and implement additional authentication layers for sensitive applications

Network Segmentation

all

Segment network to limit access to Secure Application Manager from untrusted networks

🧯 If You Can't Patch

  • Implement strict access controls and monitor for unusual authentication patterns
  • Deploy network-based controls to restrict access to the Secure Application Manager interface

🔍 How to Verify

Check if Vulnerable:

Check version in admin interface: System > Maintenance > Version Information

Check Version:

ssh admin@<appliance-ip> show version

Verify Fix Applied:

Verify version shows 22.7R2.4 or later in admin interface

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication patterns to Secure Application Manager
  • Access attempts to restricted applications from unexpected user accounts

Network Indicators:

  • Unusual traffic patterns to/from Secure Application Manager ports
  • Authentication requests followed by unexpected application access

SIEM Query:

source="ivanti-connect" AND (event_type="auth_success" AND app="secure_app_manager") AND (resource_access="restricted_application")

🔗 References

📤 Share & Export