Summary
Ivanti’s internal security team discovered a Critical Remote Code Execution (RCE) vulnerability in one of their products in late 2023. This vulnerability, known as CVE-2024-41724 (CVSS: 9.6) allows an unauthenticated attacker to execute arbitrary commands on the operating system of the appliance within the same physical or logical network.
Impact Assessment
This vulnerability impacts all supported versions of Ivanti Sentry and version 2024.4.0 of Ivanti Neurons for ITSM (Cloud) and versions R87 and R95 of Ivanti Neurons for MDM (Cloud). If exploited, this vulnerability would have a high impact on confidentiality, integrity, and availability due to the attacker's ability to execute arbitrary operating system commands. This can present a myriad of different possibilities for the attacker, including potentially allowing a backdoor into a system.
Remediation
According to Ivanti, customers can access the patch for Ivanti Sentry via the standard download portal using a login. Versions 9.17.1, 9.18.1, 9.19.1 or later of Ivanti Sentry will remediate this vulnerability.
Business Implications
Due to the nature of this vulnerability which allows an attacker to impact a machine in many ways after its exploitation, business implications can be severe. Depending on which user or machine is impacted, exploitation could have serious monetary, data, and reputational impacts.
Access Point Consulting Recommends
Patch: We recommend patching Ivanti Sentry as soon as possible through the Ivanti standard download portal. This is the best way to mitigate the vulnerability.
Harden network: According to Ivanti, the only way to exploit this vulnerability over the internet is for the threat actor to have a valid TLS client certificate enrolled through PMM / N-MDM. Providing protections through policy or security system rules will reduce the chance of this vulnerability from being exploited.
Associated Bulletins
https://forums.ivanti.com/s/article/KB-CVE-2023-41724-Remote-Code-Execution-for-Ivanti-Standalone-Sentry?language=en_US
https://forums.ivanti.com/s/article/CVE-2023-41724-Remote-Code-Execution-for-Ivanti-Standalone-Sentry?language=en_US