{"id":3799,"date":"2024-01-11T09:43:15","date_gmt":"2024-01-11T07:43:15","guid":{"rendered":"https:\/\/www.govcert.bg\/?p=3799"},"modified":"2024-01-19T10:27:05","modified_gmt":"2024-01-19T08:27:05","slug":"ivanti-%d0%bf%d1%83%d0%b1%d0%bb%d0%b8%d0%ba%d1%83%d0%b2%d0%b0-%d0%b0%d0%ba%d1%82%d1%83%d0%b0%d0%bb%d0%b8%d0%b7%d0%b0%d1%86%d0%b8%d1%8f-%d0%bd%d0%b0-%d0%b7%d0%b0%d1%89%d0%b8%d1%82%d0%b0%d1%82%d0%b0","status":"publish","type":"post","link":"https:\/\/www.govcert.bg\/en\/warnings\/ivanti-%d0%bf%d1%83%d0%b1%d0%bb%d0%b8%d0%ba%d1%83%d0%b2%d0%b0-%d0%b0%d0%ba%d1%82%d1%83%d0%b0%d0%bb%d0%b8%d0%b7%d0%b0%d1%86%d0%b8%d1%8f-%d0%bd%d0%b0-%d0%b7%d0%b0%d1%89%d0%b8%d1%82%d0%b0%d1%82%d0%b0\/","title":{"rendered":"Ivanti Releases Security Update for Connect Secure and Policy Secure Gateways"},"content":{"rendered":"<p style=\"text-align: justify;\"><a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2024\/01\/10\/ivanti-releases-security-update-connect-secure-and-policy-secure-gateways\">Ivanti<\/a> has released a security update to address an authentication bypass vulnerability (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-46805\">CVE-2023-46805<\/a>) and a command injection vulnerability (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-21887\">CVE-2024-21887<\/a>) in all supported versions (9.x and 22.x) of Connect Secure and Policy Secure gateways. A cyber threat actor could exploit these vulnerabilities to take control of an affected system.<\/p>\n<p style=\"text-align: justify;\"><strong>CERT Bulgaria<\/strong> urges users and administrators to immediately apply the current workaround in Ivanti's security update and review \u00a0<a href=\"https:\/\/www.volexity.com\/blog\/2024\/01\/10\/active-exploitation-of-two-zero-day-vulnerabilities-in-ivanti-connect-secure-vpn\/\">Volexity&#8217;s blog on these vulnerabilities<\/a>.<\/p>\n<p style=\"text-align: justify;\">More information:<br \/>\n<a href=\"https:\/\/unit42.paloaltonetworks.com\/threat-brief-ivanti-cve-2023-46805-cve-2024-21887\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/unit42.paloaltonetworks.com\/threat-brief-ivanti-cve-2023-46805-cve-2024-21887\/<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Ivanti has released a security update to address an authentication bypass vulnerability (CVE-2023-46805) and a command injection vulnerability (CVE-2024-21887) in all supported versions (9.x and 22.x) of Connect Secure and Policy Secure gateways. A cyber threat actor could exploit these vulnerabilities to take control of an affected system. <a title=\"Ivanti Releases Security Update for Connect Secure and Policy Secure Gateways\" class=\"read-more\" href=\"https:\/\/www.govcert.bg\/en\/warnings\/ivanti-%d0%bf%d1%83%d0%b1%d0%bb%d0%b8%d0%ba%d1%83%d0%b2%d0%b0-%d0%b0%d0%ba%d1%82%d1%83%d0%b0%d0%bb%d0%b8%d0%b7%d0%b0%d1%86%d0%b8%d1%8f-%d0%bd%d0%b0-%d0%b7%d0%b0%d1%89%d0%b8%d1%82%d0%b0%d1%82%d0%b0\/\" aria-label=\"More on Ivanti \u043f\u0443\u0431\u043b\u0438\u043a\u0443\u0432\u0430 \u0430\u043a\u0442\u0443\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044f \u043d\u0430 \u0437\u0430\u0449\u0438\u0442\u0430\u0442\u0430 \u0437\u0430 Connect Secure \u0438 Policy Secure Gateways\">Read more<\/a><\/p>","protected":false},"author":6,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[44],"tags":[],"class_list":["post-3799","post","type-post","status-publish","format-standard","hentry","category-warnings"],"_links":{"self":[{"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/posts\/3799","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/comments?post=3799"}],"version-history":[{"count":9,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/posts\/3799\/revisions"}],"predecessor-version":[{"id":3830,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/posts\/3799\/revisions\/3830"}],"wp:attachment":[{"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/media?parent=3799"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/categories?post=3799"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/tags?post=3799"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}