CyberWatch

Critical Ivanti Virtual Traffic Manager Vulnerability Added to CISA KEV Catalog

By

Matthew Fagan, Vulnerability Management Patch Analyst

By

Access Point Consulting

Summary

On August 12, Ivanti issued an advisory regarding a critical vulnerability in the Ivanti Virtual Traffic Manager (vTM), identified as CVE-2024-7593 with a CVSS score of 9.8. The vulnerability stems from an incorrect implementation of an authentication algorithm. Patches were released on August 19th for all affected versions. On September 24th, the vulnerability was added to the CISA Known Exploited Vulnerabilities Catalog (KEV), elevating its priority and risk.

Impact

This vulnerability, now listed in CISA’s Known Exploited Vulnerabilities (KEV) catalog, carries a critical severity level, significantly increasing its risk profile. Exploiting this vulnerability can lead to a complete loss of system Confidentiality, Integrity, and Availability. It has been associated with two Common Weakness Enumerations (CWEs): CWE-287 (Improper Authentication) and CWE-303 (Incorrect Implementation of Authentication Algorithm). Essentially, this flaw allows attackers to bypass critical authentication measures in the Ivanti Virtual Traffic Manager, putting systems at serious risk.

The affected versions of Ivanti Virtual Traffic Manager are: 22.2, 22.3, 22.3R2, 22.5R1, 22.6R1, and 22.7R1. The remediated versions are: 22.2R1, 22.3R3, 22.5R2, 22.6R2, and 22.7R2.

It is crucial to update to one of the remediated versions listed above. Ivanti provides detailed documentation to assist in upgrading the Virtual Traffic Manager.

Mitigation

To reduce the risk of exploitation, Ivanti recommends restricting Admin Access to the Management Interface, as outlined in their advisory.

Recommendations

  • Apply Updates: Updates are available for all affected versions of vTM. These should be applied immediately, as CISA has confirmed evidence of active exploitation.
  • Implement Mitigation Measures: Ivanti has provided additional mitigations to reduce the attack surface. Ensure the management interface is bound to an internal network or private IP address. Detailed network configuration guidance is provided in Ivanti's advisory, including steps in the "Mitigation or Workaround" section.
  • Check for Indicators of Compromise: Ivanti has provided indicators to detect potential exploitation. Review Audit Logs for signs of unauthorized user creation, particularly new users being added to an administrator group. This could be a sign that an attacker has breached the system and is attempting to escalate privileges.

Associated Bulletins

Security Advisory: Ivanti Virtual Traffic Manager (vTM ) (CVE-2024-7593)

NVD - CVE-2024-7593 (nist.gov)

Resources

Latest Resources

Resources

CyberWatch

April 2, 2025

Scott "Monty" Montgomery (Island) | Navigating CMMC compliance for organizations of every size

Scott Montgomery, known as Monty, joined the CyberWatch Expert Series podcast to discuss his extensive background in cybersecurity, particularly in building and designing network security tools for high-assurance environments like the Department of Defense (DoD) and the intelligence community. His experience includes significant tenure at McAfee (now Trellix), which led him to his current role at Island, where he focuses on innovative approaches to cybersecurity compliance.

Find out more
March 19, 2025

Michael Sviben (DomainGuard) | Defending against phishing and building proactive security awareness

Cybersecurity threats evolve rapidly, and one tactic consistently rises above the rest: phishing. In this episode of CyberWatch, Michael Sviben, co-founder of DomainGuard, discusses why phishing remains so effective, how businesses and individuals become targets, and what you can do to stay vigilant.

Find out more
March 5, 2025

David Habib (Brightspot) | Building a culture of cybersecurity awareness

Cybersecurity awareness is often reduced to check-the-box training, but David Habib, CIO at Brightspot, argues that real security awareness isn’t about formal programs—it’s about making security part of a company’s culture. In this episode, he shares practical insights on how organizations can move beyond stale training sessions to create an engaged and security-conscious workforce.

Find out more