{"id":4234,"date":"2024-09-20T10:06:59","date_gmt":"2024-09-20T07:06:59","guid":{"rendered":"https:\/\/www.govcert.bg\/?p=4234"},"modified":"2024-09-20T10:52:48","modified_gmt":"2024-09-20T07:52:48","slug":"ivanti-%d0%bf%d1%83%d0%b1%d0%bb%d0%b8%d0%ba%d1%83%d0%b2%d0%b0-admin-bypass-security-update","status":"publish","type":"post","link":"https:\/\/www.govcert.bg\/en\/warnings\/ivanti-%d0%bf%d1%83%d0%b1%d0%bb%d0%b8%d0%ba%d1%83%d0%b2%d0%b0-admin-bypass-security-update\/","title":{"rendered":"Ivanti Releases Admin Bypass Security Update for Cloud Services Appliance"},"content":{"rendered":"<p style=\"text-align: justify;\"><a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2024\/09\/19\/ivanti-releases-admin-bypass-security-update-cloud-services-appliance\">Ivanti<\/a> has released a security update to address an admin bypass vulnerability (CVE-2024-8963) affecting Ivanti Cloud Services Appliance (CSA) version 4.6.  A cyber threat actor could exploit this vulnerability in conjunction with CVE-2024-8190. This vulnerability impacts all versions prior to patch 519.<\/p>\n<p style=\"text-align: justify;\"><strong>CERT Bulgaria<\/strong> CERT Bulgaria urges users and administrators review the <a href=\"https:\/\/forums.ivanti.com\/s\/article\/Security-Advisory-Ivanti-CSA-4-6-Cloud-Services-Appliance-CVE-2024-8963?language=en_US&amp;_gl=1*a51ayp*_gcl_au*MTM3OTIyMzI4MC4xNzIxMjUyMjIy\">Ivanti security advisory<\/a> for more information and apply the necessary updates.<\/p>","protected":false},"excerpt":{"rendered":"<p>Ivanti has released a security update to address an admin bypass vulnerability (CVE-2024-8963) affecting Ivanti Cloud Services Appliance (CSA) version 4.6.  A cyber threat actor could exploit this vulnerability in conjunction with CVE-2024-8190. This vulnerability impacts all versions prior to patch 519. <a title=\"Ivanti Releases Admin Bypass Security Update for Cloud Services Appliance\" class=\"read-more\" href=\"https:\/\/www.govcert.bg\/en\/warnings\/ivanti-%d0%bf%d1%83%d0%b1%d0%bb%d0%b8%d0%ba%d1%83%d0%b2%d0%b0-admin-bypass-security-update\/\" aria-label=\"More on Ivanti \u043f\u0443\u0431\u043b\u0438\u043a\u0443\u0432\u0430 Admin Bypass Security Update\">Read more<\/a><\/p>","protected":false},"author":6,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[44],"tags":[],"class_list":["post-4234","post","type-post","status-publish","format-standard","hentry","category-warnings"],"_links":{"self":[{"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/posts\/4234","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/comments?post=4234"}],"version-history":[{"count":2,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/posts\/4234\/revisions"}],"predecessor-version":[{"id":4239,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/posts\/4234\/revisions\/4239"}],"wp:attachment":[{"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/media?parent=4234"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/categories?post=4234"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/tags?post=4234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}