September 14, 2024 at 12:39AM
Ivanti disclosed an actively exploited high-severity vulnerability (CVE-2024-8190) in its Cloud Service Appliance, impacting version 4.6, prompting customers to upgrade to version 5.0. The company noted confirmed exploitation in the wild targeting a limited number of customers and urged federal agencies to apply fixes by October 4, 2024. Additionally, a critical deserialization vulnerability (CVE-2024-29847) in Endpoint Manager was detailed by cybersecurity company Horizon3.ai.
Key takeaways from the meeting notes:
– Ivanti has disclosed a newly patched security flaw (CVE-2024-8190) in its Cloud Service Appliance (CSA) that is being actively exploited in the wild.
– The high-severity vulnerability allows remote code execution under certain circumstances and impacts Ivanti CSA 4.6, which has reached end-of-life status, necessitating an upgrade to a supported version.
– The company has released a patch (CSA 4.6 Patch 519) as the last fix for this version and advises customers to upgrade to Ivanti CSA 5.0 for continued support.
– Ivanti observed confirmed exploitation of the flaw in the wild targeting a limited number of customers and has updated its advisory accordingly.
– The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added the vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, mandating federal agencies to apply the fixes by October 4, 2024.
– A cybersecurity company, Horizon3.ai, has published a detailed technical analysis of a critical deserialization vulnerability (CVE-2024-29847, CVSS score: 10.0) impacting Endpoint Manager (EPM) that results in remote code execution.
Please let me know if you need any further details or information.