Learn about CVE-2024-7593, a critical Ivanti vTM vulnerability, its risks, and how to patch and protect your systems from potential attacks.
Type: | Authentication bypass |
Severity | CVSS: 9.8 |
Wild Exploit: | No |
PoC | Yes |
Platforms: | Ivanti Virtual Traffic Manager |
Affects: | 22.2 – 22.7R1 |
MITRE advisory | Read more |
Remediation action | Apply recommended patches. |
CVE-2024-7593 is a critical authentication bypass vulnerability in Ivanti Virtual Traffic Manager (vTM). It allows unauthenticated, remote attackers to gain administrative access to the management interface of vTM, potentially leading to full system compromise.
The vulnerability stems from an incorrect implementation of an authentication algorithm and affects vTM versions prior to 22.2R1 and 22.7R2.
If your organization uses Ivanti vTM for application traffic management and is running a version earlier than 22.2R1 or 22.7R2, your system could be vulnerable. Especially if the vTM management interface is exposed to the internet, attackers may exploit this flaw to bypass authentication and create rogue admin accounts.
While there is no confirmed evidence of active exploitation as of the time of disclosure, a public proof-of-concept (PoC) exploit is available. This increases the likelihood that threat actors could soon leverage the vulnerability in attacks, so it’s important to patch as soon as possible.
To protect your systems, Ivanti has released patches for affected versions, including 22.2R1 and 22.7R2. It is crucial to apply these updates immediately.
Additionally, administrators should restrict access to the management interface by binding it to internal networks or private IPs to reduce the risk of exposure. Monitoring logs for any suspicious new admin accounts (like ‘user1’ or ‘user2’) can also help detect exploitation attempts.
Each new vulnerability is a reminder of where we stand and what we need to do better. Check out the following resources to help you maintain cyber hygiene and stay ahead of the threat actors: