Zero-Day Alert: Three Critical Ivanti CSA Vulnerabilities Actively Exploited

Share:

Ivanti has warned that three new security vulnerabilities impacting its Cloud Service Appliance (CSA) have come under active exploitation in the wild.

The zero-day flaws are being weaponized in conjunction with another flaw in CSA that the company patched last month, the Utah-based software services provider said.

Successful exploitation of these vulnerabilities could allow an authenticated attacker with admin privileges to bypass restrictions, run arbitrary SQL statements, or obtain remote code execution.

“We are aware of a limited number of customers running CSA 4.6 patch 518 and prior who have been exploited when CVE-2024-9379, CVE-2024-9380, or CVE-2024-9381 are chained with CVE-2024-8963,” the company said.

There is no evidence of exploitation against customer environments running CSA 5.0. A brief description of the three shortcomings is as follows –

  • CVE-2024-9379 (CVSS score: 6.5) – SQL injection in the admin web console of Ivanti CSA before version 5.0.2 allows a remote authenticated attacker with admin privileges to run arbitrary SQL statements
  • CVE-2024-9380 (CVSS score: 7.2) – An operating system (OS) command injection vulnerability in the admin web console of Ivanti CSA before version 5.0.2 allows a remote authenticated attacker with admin privileges to obtain remote code execution
  • CVE-2024-9381 (CVSS score: 7.2) – Path traversal in Ivanti CSA before version 5.0.2 allows a remote authenticated attacker with admin privileges to bypass restrictions.

The attacks observed by Ivanti involve combining the aforementioned flaws with CVE-2024-8963 (CVSS score: 9.4), a critical path traversal vulnerability that allows a remote unauthenticated attacker to access restricted functionality.

Ivanti said it discovered the three new flaws as part of its investigation into the exploitation of CVE-2024-8963 and CVE-2024-8190 (CVSS score: 7.2), another now-patched OS command injection bug in CSA that has also been abused in the wild.

Besides updating to the latest version (5.0.2), the company is recommending users to review the appliance for modified or newly added administrative users to look for signs of compromise, or check for alerts from endpoint detection and response (EDR) tools installed on the device.

The development comes less than a week after the U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a security flaw impacting Ivanti Endpoint Manager (EPM) that was fixed in May (CVE-2024-29824, CVSS score: 9.6) to the Known Exploited Vulnerabilities (KEV) catalog.

CVE-2024-9381 No Longer Considered Actively Exploited

Ivanti has since revised its original advisory, removing references to active exploitation of CVE-2024-9381. When reached for comment, Ivanti told The Hacker News that the flaw was inadvertently marked as exploited due to a “clerical error.”

“The update [to the advisory] was to address a clerical error in our reporting,” a spokesperson from Ivanti said. “CVE-2024-9381 was discovered internally, and we are not aware of any exploitation in the wild. Ivanti continues to strongly urge all customers who have not already done so to upgrade to CSA 5.0.2.”

“We have observed limited exploitation of CSA 4.6 when CVE-2024-9379 or CVE-2024-9380 are chained with CVE-2024-8963, present in CSA 4.6 patch 518 and below, it could lead to unauthenticated remote code execution,” the updated bulletin states.

The development has prompted CISA to add both CVE-2024-9379 and CVE-2024-9380 to the KEV catalog, requiring federal agencies to apply the patches by October 30, 2024.

Ravie Lakshmanan

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
10:09 am, Jul 1, 2025
weather icon 29°C
L: 27° | H: 30°
overcast clouds
Humidity: 55 %
Pressure: 1013 mb
Wind: 5 mph E
Wind Gust: 0 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 96%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 4:47 am
Sunset: 9:20 pm
DailyHourly
Daily ForecastHourly Forecast
Today 10:00 pm
weather icon
27° | 30°°C 0 mm 0% 10 mph 61 % 1014 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
18° | 22°°C 1 mm 100% 10 mph 88 % 1023 mb 0 mm/h
Thu Jul 03 10:00 pm
weather icon
13° | 26°°C 0 mm 0% 9 mph 56 % 1029 mb 0 mm/h
Fri Jul 04 10:00 pm
weather icon
15° | 26°°C 0 mm 0% 9 mph 50 % 1028 mb 0 mm/h
Sat Jul 05 10:00 pm
weather icon
16° | 23°°C 1 mm 100% 14 mph 93 % 1021 mb 0 mm/h
Today 1:00 pm
weather icon
29° | 30°°C 0 mm 0% 7 mph 49 % 1013 mb 0 mm/h
Today 4:00 pm
weather icon
31° | 33°°C 0 mm 0% 10 mph 34 % 1012 mb 0 mm/h
Today 7:00 pm
weather icon
31° | 31°°C 0 mm 0% 10 mph 33 % 1012 mb 0 mm/h
Today 10:00 pm
weather icon
23° | 23°°C 0 mm 0% 8 mph 61 % 1014 mb 0 mm/h
Tomorrow 1:00 am
weather icon
20° | 20°°C 0 mm 0% 6 mph 70 % 1015 mb 0 mm/h
Tomorrow 4:00 am
weather icon
19° | 19°°C 0 mm 0% 5 mph 79 % 1016 mb 0 mm/h
Tomorrow 7:00 am
weather icon
18° | 18°°C 0 mm 0% 6 mph 76 % 1016 mb 0 mm/h
Tomorrow 10:00 am
weather icon
22° | 22°°C 0 mm 0% 4 mph 62 % 1016 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€90,557.71
-0.82%
Ethereum(ETH)
€2,082.57
-0.72%
Tether(USDT)
€0.85
0.00%
XRP(XRP)
€1.88
1.35%
Solana(SOL)
€126.51
-0.52%
USDC(USDC)
€0.85
0.00%
Dogecoin(DOGE)
€0.136559
-2.81%
Shiba Inu(SHIB)
€0.000009
-2.19%
Pepe(PEPE)
€0.000008
-3.54%
Scroll to Top