Alerts: Ivanti Releases Security Update for Cloud Services Appliance

Source URL: https://www.cisa.gov/news-events/alerts/2024/09/13/ivanti-releases-security-update-cloud-services-appliance
Source: Alerts
Title: Ivanti Releases Security Update for Cloud Services Appliance

Feedly Summary: Ivanti has released a security update addressing an OS command injection vulnerability (CVE-2024-8190) affecting Ivanti Cloud Services Appliance (CSA) 4.6 (all versions before patch 519). A cyber threat actor could exploit this vulnerability to take control of an affected system.  
At this time, Ivanti has confirmed limited exploitation and urges its customers using the affected versions to upgrade to CSA version 5.0. Ivanti no longer supports CSA 4.6 (end-of-life). 
CISA recommends users and administrators review the Ivanti security advisory and apply the recommended updates. 
Note: CISA has added CVE-2024-8190 to its Known Exploited Vulnerabilities Catalog, which, per Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities, requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the specified due date to protect FCEB networks against active threats. 

AI Summary and Description: Yes

Summary: Ivanti’s recent security update addresses a significant OS command injection vulnerability (CVE-2024-8190) in its Cloud Services Appliance (CSA), underscoring the urgent need for organizations to upgrade to the latest version. The involvement of CISA and the requirement for federal agencies to remediate known vulnerabilities further highlights the critical nature of this issue for security professionals.

Detailed Description:

– Ivanti has issued a security update for the Ivanti Cloud Services Appliance (CSA) 4.6, which is affected by a serious OS command injection vulnerability (CVE-2024-8190).
– This vulnerability poses a risk as cyber threat actors can exploit it to gain unauthorized control over affected systems.
– Ivanti has confirmed that there has been limited exploitation of this vulnerability.
– The company strongly advises customers using affected versions to upgrade to CSA version 5.0, as version 4.6 has reached its end-of-life status and is no longer supported.
– The Cybersecurity and Infrastructure Security Agency (CISA) has added this vulnerability to its Known Exploited Vulnerabilities Catalog. This indicates a heightened level of concern and the need for immediate attention.
– According to CISA’s Binding Operational Directive (BOD) 22-01, federal agencies (Federal Civilian Executive Branch, FCEB) are required to remediate known vulnerabilities swiftly to protect their networks from real-time threats.

Implications for Security Professionals:
– The necessity for immediate action emphasizes the importance of regular security updates and patch management within organizations.
– The inclusion of this vulnerability in the CISA catalog highlights ongoing threats and the critical need for compliance with federal cybersecurity mandates.
– Organizations should ensure they stay informed about vulnerabilities affecting their systems and prioritize remediation based on guidance from authoritative bodies like CISA.

This incident serves as a reminder of the ever-present risks in cloud infrastructure and the need for vigilance in maintaining security hygiene.