Home

Some companies that have chosen us

Privacy Officer and Privacy Consultant
CDP Scheme according to ISO/IEC 17024:2012
European Privacy Auditor
ISDP©10003 Certification Scheme according to ISO/IEC 17065:2012
Auditor
According to standard UNI 11697:2017
Lead Auditor ISO/IEC 27001:2022
According to standard ISO/IEC 17024:2012
Data Protection Officer
According to standard ISO/IEC 17024:2012
Anti-Bribery Lead Auditor Expert
According to standard ISO/IEC 17024:2012
ICT Security Manager
According to standard UNI 11506:2017
IT Service Management (ITSM)
According to the ITIL Foundation
Ethical Hacker (CEH)
According to the EC-Council
Network Defender (CND)
According to the EC-Council
Computer Hacking Forensics Investigator (CHFI)
According to the EC-Council
Penetration Testing Professional (CPENT)
According to the EC-Council

Professional qualifications

Stay up-to-date with world news!

Select your topics of interest:
CYBER ALERT
Home / CYBER ALERT
/
Ivanti October Security Update (AL06/241008/CSIRT-ITA)

Ivanti October Security Update (AL06/241008/CSIRT-ITA)

Summary

Ivanti releases security updates that address 11 vulnerabilities, including one critical and nine high-severity vulnerabilities, in EPMM (Core), CSA (Cloud Services Appliance), Velocity License Server, Avalanche, Connect Secure, and Policy Sicuro products.

Note: The vendor states thatCVE-2024-9379 , CVE-2024-9380 e CVE-2024-9381 are being actively exploited online.

Risk

Restrictions Community Impact Estimate: SEVERE/RED (75.89/100) 1.

Type

  • Write/Read Arbitrary Files
  • Remote Code Execution
  • Security Restriction Bypass
  • Privilege Escalation
  • Information Disclosure
  • Denial of Service
  • Authentication Bypass

Affected Products and Versions

Ivanti

  • EPMM (Core), version 12.1.0.3 and earlier
  • CSA (Cloud Services Appliance), version 5.0.1 and earlier
  • Velocity License Server 5.1.x, versions prior to 5.1.2
  • Avalanche, version 6.4.2.313 and earlier
  • Connect Secure, version 22.7R2.1 and earlier
  • Policy Secure, version 22.7R1.1 and earlier

Mitigation Actions

In line with vendor statements, it is recommended that vulnerable products be updated as per the security bulletins listed in the References section.

Unique Weakness Identifiers

The CVEs for the “Critical” and “High” severity weaknesses are listed below:

CVE-2024-37404

CVE-2024-47008

CVE-2024-47011

CVE-2024-47010

CVE-2024-47009

CVE-2024-47007

CVE-2024-7612

CVE-2024-9167

CVE-2024-9380

CVE-2024-9381

References

https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2024-7612?lingual=en_US

https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-Cloud-Services-Appliance-CVE-2024-9379-CVE-2024-9380-CVE-2024-9381?lingual=en_US

https://forums.ivanti.com/s/article/Security-Advisory-Velocity-License-Server-CVE-2024-9167?lingual=en_US

https://forums.ivanti.com/s/article/Ivanti-Avalanche-6-4-5-Security-Advisory?lingual=en_US

https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-and-Policy-Secure-CVE-2024-37404?lingual=en_US

1 This estimate is made taking into account several parameters, including: CVSS, availability of patches/workarounds and PoC, diffusion of the affected software/devices in the reference community.

Recommended to you

Search in 365TRUST

Our services