"Critical Ivanti Authentication Bypass Bug Exploited in Wild"

According to the Cybersecurity and Infrastructure Security Agency (CISA), a critical authentication bypass vulnerability in Ivanti Virtual Traffic Manager (vTM) has now been exploited by threat actors in the wild.  CISA added the bug to its long list of Known Exploited Vulnerabilities (KEV) on September 24, with federal agencies given until October 15 to patch it.  However, Ivanti has yet to update its security advisory to reflect the new information.  The vulnerability in question, CVE-2024-7593, is given a CVSS score of 9.8, reflecting that it could enable authentication bypass and the creation of a new user with admin rights.  CISA noted that incorrect implementation of an authentication algorithm in Ivanti vTM other than versions 22.2R1 or 22.7R2 allows a remote unauthenticated attacker to bypass authentication of the admin panel. 

 

Infosecurity Magazine reports: "Critical Ivanti Authentication Bypass Bug Exploited in Wild"

Submitted by Adam Ekwall on