Exploit released for Ivanti Sentry bug abused as zero-day in attacks

Ivanti

Proof-of-concept exploit code is now available for a critical Ivanti Sentry authentication bypass vulnerability that enables attackers to execute code remotely as root on vulnerable systems.

Discovered by cybersecurity company mnemonic, the flaw (CVE-2023-38035) allows threat actors to access sensitive Sentry administrator interface APIs by exploiting an insufficiently restrictive Apache HTTPD configuration.

Successful exploitation can let them run system commands or write files onto systems running Ivanti Sentry versions 9.18 and prior.

Today, security researchers at attack surface assessment company Horizon3 have published a technical root cause analysis for this high-severity vulnerability and a proof-of-concept (PoC) exploit.

“This POC abuses an unauthenticated command injection to execute arbitrary commands as the root user,” Horizon3 vulnerability researcher James Horseman said.

“We recommend that any affected users of this product patch and verify that it is not exposed externally to the internet if possible.”

CVE-2023-38035 POC exploit tweet

​Used in attacks as a zero-day

Ivanti provides detailed info on applying the Sentry security updates in this knowledgebase article. The company also confirmed that some of its customers were impacted by CVE-2023-38035 attacks and advised admins to restrict access to the internal network.

However, according to a Shodan search, more than 500 Ivanti Sentry instances are currently exposed online.

On Tuesday, CISA added the security flaw to its Known Exploited Vulnerabilities Catalog, ordering federal agencies to secure their systems by September 14.

Starting in April, state-affiliated hackers have abused two other security vulnerabilities in Ivanti’s Endpoint Manager Mobile (EPMM), previously recognized as MobileIron Core.

CVE-2023-35078, another severe authentication bypass flaw, was exploited as a zero-day maneuver to infiltrate the networks of multiple government organizations in Norway.

A week ago, Ivant patched another pair of critical stack-based buffer overflows collectively tracked as CVE-2023-32560 within its Avalanche enterprise mobility management (EMM) solution, which could lead to system crashes and arbitrary execution of code upon successful attacks.


Original Source



A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

 To keep up to date follow us on the below channels.