CyberWatch

Critical RCE Vulnerability Patched in Ivanti Standalone Sentry

By

By

Access Point Consulting

Summary

Ivanti’s internal security team discovered a Critical Remote Code Execution (RCE) vulnerability in one of their products in late 2023. This vulnerability, known as CVE-2024-41724 (CVSS: 9.6) allows an unauthenticated attacker to execute arbitrary commands on the operating system of the appliance within the same physical or logical network.

Impact Assessment

This vulnerability impacts all supported versions of Ivanti Sentry and version 2024.4.0 of Ivanti Neurons for ITSM (Cloud) and versions R87 and R95 of Ivanti Neurons for MDM (Cloud). If exploited, this vulnerability would have a high impact on confidentiality, integrity, and availability due to the attacker's ability to execute arbitrary operating system commands. This can present a myriad of different possibilities for the attacker, including potentially allowing a backdoor into a system.

Remediation

According to Ivanti, customers can access the patch for Ivanti Sentry via the standard download portal using a login. Versions 9.17.1, 9.18.1, 9.19.1 or later of Ivanti Sentry will remediate this vulnerability.

Business Implications

Due to the nature of this vulnerability which allows an attacker to impact a machine in many ways after its exploitation, business implications can be severe. Depending on which user or machine is impacted, exploitation could have serious monetary, data, and reputational impacts.

Access Point Consulting Recommends

Patch: We recommend patching Ivanti Sentry as soon as possible through the Ivanti standard download portal. This is the best way to mitigate the vulnerability.

Harden network: According to Ivanti, the only way to exploit this vulnerability over the internet is for the threat actor to have a valid TLS client certificate enrolled through PMM / N-MDM. Providing protections through policy or security system rules will reduce the chance of this vulnerability from being exploited.

Associated Bulletins

https://forums.ivanti.com/s/article/KB-CVE-2023-41724-Remote-Code-Execution-for-Ivanti-Standalone-Sentry?language=en_US

https://forums.ivanti.com/s/article/CVE-2023-41724-Remote-Code-Execution-for-Ivanti-Standalone-Sentry?language=en_US

 

Resources

Trending Articles & Security Reports

Resources

CyberWatch

September 19, 2024

Stealing the Show: From Competitor to Threat Actor

In December 2020, Ticketmaster was hit with a $10 million fine for an act of corporate espionage. The company had engaged in unauthorized access to a competitor's computer systems, using stolen login credentials to gather confidential business intelligence. Although this scandal broke nearly four years ago, it serves as a reminder of the legal and ethical responsibilities businesses must adhere to in today’s marketplace.

Find out more
September 18, 2024

Adobe Patched Potential Zero-Day in Reader

Adobe released a patch for a suspected zero-day vulnerability in Adobe Reader, identified as CVE-2024-41869. This vulnerability, a Use After Free (UAF) issue, can lead to arbitrary code execution, system crashes, or the return of unexpected values.

Find out more
September 16, 2024

Why We Need NIST's Post-Quantum Cryptography Standards

Last month, NIST published its first set of post-quantum cryptography (PQC) standards, setting a new benchmark for enterprises, government agencies, and vendors to withstand future cyberattacks from quantum computers. The time to start transitioning is now. Discover what’s at stake with CyberWatch.

Find out more