Remote Authentication Bypass Vulnerability Affects Ivanti ICS and Policy Secure
CVE-2023-46805

8.2HIGH

Key Information:

Vendor
Ivanti
Status
Vendor
CVE Published:
12 January 2024

Badges

🥇 Trended No. 1📈 Trended📈 Score: 32,000💰 Ransomware👾 Exploit Exists🟡 Public PoC🟣 EPSS 96%🦅 CISA Reported📰 News Worthy

What is CVE-2023-46805?

CVE-2023-46805 is a significant vulnerability that affects Ivanti's Integrated Cloud Services (ICS) and Policy Secure platforms. This vulnerability constitutes a remote authentication bypass, allowing unauthorized users to gain access to restricted resources without proper authentication checks. Such access could lead to unauthorized manipulation of sensitive data and critical system functions, thereby posing substantial risks to organizational security and operational integrity.

Technical Details

The vulnerability resides in the web component of Ivanti ICS versions 9.x and 22.x as well as Ivanti Policy Secure. The flaw enables remote attackers to bypass established authentication mechanisms, thereby gaining access to secure areas of the application. This type of vulnerability typically arises from inadequacies in code that manages user credentials and session validation processes. The capability to bypass these controls raises serious concerns regarding user data and resource protection within the affected platforms.

Impact of the Vulnerability

  1. Unauthorized Access: The most immediate impact is that attackers can authenticate themselves without proper credentials, leading to unrestricted access to sensitive information and administrative functions within the Ivanti systems.

  2. Data Integrity Risks: With unauthorized access, attackers can manipulate or degrade the integrity of critical data stored within the system. This manipulation may lead to misinformation, data breaches, and loss of trust in the data management processes.

  3. Increased Attack Surface: The existence of this vulnerability can potentially expose organizations to further attacks. Once an attacker gains access through this bypass, they may deploy additional threats, such as installing malware or initiating lateral movement within the network. This escalates the risk of broader system compromise and financial repercussions from data breaches.

CISA Reported

CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace as recent news articles suggest the vulnerability is being used by ransomware groups.

The CISA's recommendation is: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Affected Version(s)

ICS 9.1R18

ICS 22.6R2

IPS 9.1R18

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

Ivanti’s bug-plagued network appliances attacked using fresh exploit

Multiple threat actors have begun exploiting one of four recently discovered flaws afflicting the vendor’s VPN and network gateway products.

3 weeks ago

watchTowr Labs - Blog

The epicentre of offensive security expertise and research at watchTowr - watchTowr Labs.

8 months ago

Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery

Ivanti Connect Secure (ICS) devices are under attack! Two critical vulnerabilities are being exploited to deploy the notorious Mirai botnet.

8 months ago

References

EPSS Score

96% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
8.2
Severity:
HIGH
Confidentiality:
High
Integrity:
Low
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 🥇

    Vulnerability reached the number 1 worldwide trending spot

  • 💰

    Used in Ransomware

  • 📈

    Vulnerability started trending

  • Vulnerability published

  • 👾

    Exploit known to exist

  • 🦅

    CISA Reported

  • 📰

    First article discovered by Bleeping Computer

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre DatabaseCISA Database3 Proof of Concept(s)56 News Article(s)
.