⚠️ want a highly impactful, actively exploited border gateway zero days situation to wake you up?

Ivanti Pulse Secure aka Ivanti Connect Secure and Ivanti Policy Secure Gateway customers - prepare to deploy mitigations and await follow on patches.

In the wild exploitation, probable nation state - includes authentication (including MFA) bypass and code execution.

Looks like Ivanti have done a really good job identifying.

I call it ConnectAround. #threatintel #connectaround

It's really widely used in enterprise space and government, so I would suggest it's one to get skates on and may need a bunch of compromise assessments at larger orgs.
Will (@thegpfury)

@GossiTheDog@cyberplace.social They just sent out a blast with a mitigation.

Excelsior!
Ivanti Community

A Shodan search for #ConnectAround

html:"welcome.cgi?p=logo"

https://beta.shodan.io/search?query=html%3A%22welcome.cgi%3Fp%3Dlogo%22

Combine it with ssl:yourorg or org:yourorg to find your devices

Security Update for Ivanti Connect Secure and Ivanti Policy Secure Gateways

We have discovered new vulnerabilities in Ivanti Connect Secure (formerly Pulse Secure) and Ivanti Policy Secure gateways. We are reporting these vulnerabilities as CVE-2023-46805 and CVE-2024-21887.

This is definitely being actively used in the wild - Ivanti have opted to hide that part behind a paywall. Paywall link: https://forums.ivanti.com/s/article/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways
Ivanti Community

Ivanti disclosure flow chart, apparently.

More info on #ConnectAround from @volexity

https://www.volexity.com/blog/2024/01/10/active-exploitation-of-two-zero-day-vulnerabilities-in-ivanti-connect-secure-vpn/

- Exploitation dates to at least late 2023
- Chinese nation state actor

Loads of info in the blog.

Another #ConnectAround Shodan search: product:"Pulse Secure"

Obvious point - there will likely be more #ConnectAround victims.

Most orgs don't have the capability to detect suspected zero day exploitation of a VPN and call in Mandiant IR... they probably have Bob The Builder as an MSP and a security budget of 4 twigs.

Ivanti Community

CISA have added the two CVEs ( CVE-2024-21887 and CVE-2023-46805 ) to KEV, and are requiring mitigation application on Federal Civilian Executive Branch (FCEB) agency networks by 31st January 2024. https://www.cisa.gov/known-exploited-vulnerabilities-catalog #ConnectAround #threatintel
Exploitation of vulnerabilities affecting Ivanti Connect Secure and Ivanti Policy Secure

Organisations are encouraged to take immediate action to mitigate vulnerabilities affecting Ivanti Connect Secure (ICS) and Ivanti Policy Secure (IPS) gateways (CVE-2023-46805 and CVE-2024-21887), and follow the latest vendor advice.

Cutting Edge: Suspected APT Targets Ivanti Connect Secure VPN in New Zero-Day Exploitation | Mandiant

Mandiant
I have written a #ConnectAround scanner and I’m scanning the internet’s to see exposure level, if you spot me in your logs. #threatintel

The finders of #ConnectAround have updated their blog to say 1700 orgs have been compromised, not less than 10 https://www.volexity.com/blog/2024/01/15/ivanti-connect-secure-vpn-exploitation-goes-global/

If you use Pulse Secure, you probably want to find an IR firm.

#threatintel

Ivanti Connect Secure VPN Exploitation Goes Global

On January 10, 2024, Volexity publicly shared details of targeted attacks by UTA00178 exploiting two zero-day vulnerabilities (CVE-2024-21887 and CVE-2023-46805) in Ivanti Connect Secure (ICS) VPN appliances. On the same day, Ivanti published a mitigation that could be applied to ICS VPN appliances to prevent exploitation of these vulnerabilities. Since publication of these details, Volexity has continued to monitor its existing customers for exploitation. Volexity has also been contacted by multiple organizations that saw signs of compromise by way of mismatched file detections. Volexity has been actively working multiple new cases of organizations with compromised ICS VPN appliances.

Volexity

If you use the Ivanti integrity checking tool, the results it gives are encrypted and can only be read by Ivanti support.

Since there are thousands of #ConnectAround victims, this doesn’t scale. To compensate you can decrypt the results yourself now: https://gist.github.com/rxwx/03a036d8982c9a3cead0c053cf334605 HT @buffaloverflow

#threatintel

Encrypt and decrypt Pulse Secure configuration files (no password)

Encrypt and decrypt Pulse Secure configuration files (no password) - pulse-cfg-crypt.py

Gist
@GossiTheDog not any more I’m afraid. GitHub made me take it down as they received a complaint.
@buffaloverflow @GossiTheDog You could accidentally create a magnet link for the file and make it available to anyone/researcher that needs access to the file. They'd have a job getting that taken down
@buffaloverflow @GossiTheDog what was the basis of their complaint? Is there actually a legitimate claim that prevents it existing or did github just fold at the first sign of trouble because ivanti legal made sad trombone noises? (I am game to try hosting it)
×
It's really widely used in enterprise space and government, so I would suggest it's one to get skates on and may need a bunch of compromise assessments at larger orgs.
Will (@thegpfury)

@GossiTheDog@cyberplace.social They just sent out a blast with a mitigation.

Excelsior!
Ivanti Community

A Shodan search for #ConnectAround

html:"welcome.cgi?p=logo"

https://beta.shodan.io/search?query=html%3A%22welcome.cgi%3Fp%3Dlogo%22

Combine it with ssl:yourorg or org:yourorg to find your devices

Security Update for Ivanti Connect Secure and Ivanti Policy Secure Gateways

We have discovered new vulnerabilities in Ivanti Connect Secure (formerly Pulse Secure) and Ivanti Policy Secure gateways. We are reporting these vulnerabilities as CVE-2023-46805 and CVE-2024-21887.

This is definitely being actively used in the wild - Ivanti have opted to hide that part behind a paywall. Paywall link: https://forums.ivanti.com/s/article/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways
Ivanti Community

Ivanti disclosure flow chart, apparently.

More info on #ConnectAround from @volexity

https://www.volexity.com/blog/2024/01/10/active-exploitation-of-two-zero-day-vulnerabilities-in-ivanti-connect-secure-vpn/

- Exploitation dates to at least late 2023
- Chinese nation state actor

Loads of info in the blog.

Another #ConnectAround Shodan search: product:"Pulse Secure"

Obvious point - there will likely be more #ConnectAround victims.

Most orgs don't have the capability to detect suspected zero day exploitation of a VPN and call in Mandiant IR... they probably have Bob The Builder as an MSP and a security budget of 4 twigs.

Ivanti Community

CISA have added the two CVEs ( CVE-2024-21887 and CVE-2023-46805 ) to KEV, and are requiring mitigation application on Federal Civilian Executive Branch (FCEB) agency networks by 31st January 2024. https://www.cisa.gov/known-exploited-vulnerabilities-catalog #ConnectAround #threatintel
Exploitation of vulnerabilities affecting Ivanti Connect Secure and Ivanti Policy Secure

Organisations are encouraged to take immediate action to mitigate vulnerabilities affecting Ivanti Connect Secure (ICS) and Ivanti Policy Secure (IPS) gateways (CVE-2023-46805 and CVE-2024-21887), and follow the latest vendor advice.

Cutting Edge: Suspected APT Targets Ivanti Connect Secure VPN in New Zero-Day Exploitation | Mandiant

Mandiant
I have written a #ConnectAround scanner and I’m scanning the internet’s to see exposure level, if you spot me in your logs. #threatintel

The finders of #ConnectAround have updated their blog to say 1700 orgs have been compromised, not less than 10 https://www.volexity.com/blog/2024/01/15/ivanti-connect-secure-vpn-exploitation-goes-global/

If you use Pulse Secure, you probably want to find an IR firm.

#threatintel

Ivanti Connect Secure VPN Exploitation Goes Global

On January 10, 2024, Volexity publicly shared details of targeted attacks by UTA00178 exploiting two zero-day vulnerabilities (CVE-2024-21887 and CVE-2023-46805) in Ivanti Connect Secure (ICS) VPN appliances. On the same day, Ivanti published a mitigation that could be applied to ICS VPN appliances to prevent exploitation of these vulnerabilities. Since publication of these details, Volexity has continued to monitor its existing customers for exploitation. Volexity has also been contacted by multiple organizations that saw signs of compromise by way of mismatched file detections. Volexity has been actively working multiple new cases of organizations with compromised ICS VPN appliances.

Volexity

If you use the Ivanti integrity checking tool, the results it gives are encrypted and can only be read by Ivanti support.

Since there are thousands of #ConnectAround victims, this doesn’t scale. To compensate you can decrypt the results yourself now: https://gist.github.com/rxwx/03a036d8982c9a3cead0c053cf334605 HT @buffaloverflow

#threatintel

Encrypt and decrypt Pulse Secure configuration files (no password)

Encrypt and decrypt Pulse Secure configuration files (no password) - pulse-cfg-crypt.py

Gist
Unfortunately it looks like Ivanti have been a bit naughty with CVE allocation too. @buffaloverflow #ConnectAround

Complete exploitation info for #ConnectAround is now public. https://attackerkb.com/topics/AdUh6by52K/cve-2023-46805

It’s a chaotic mix of ../../ directory traversal and open APIs… if you haven’t applied the mitigations you’re going to have a really bad time as ransomware groups will jump on the train soon. #threatintel

CVE-2023-46805 | AttackerKB

Starting January 10, 2024, multiple parties (Ivanti, Volexity, and Mandiant) disclosed the existence of a zero-day exploit chain affecting Ivanti Connect Secur…

AttackerKB
Threat Brief: Ivanti Vulnerabilities CVE-2023-46805 and CVE-2024-21887

Ivanti VPNs can be exploited by CVE-2023-46805 (High severity) and CVE-2024-21887 (Critical severity), chained together to run commands without authentication.

Unit 42

Amazing - first mass spraying of #ConnectAround by notChina and they’re delivering.. coin miners. 🤣🤣🤣

https://infosec.exchange/@greynoise/111773096176640713

#threatintel

GreyNoise (@greynoise@infosec.exchange)

Attached: 1 image We're seeing more than just scanning for the recent pair of Ivanti Connect Secure vulnerabilities (CVE-2023-46805 and CVE-2024-21887) - we're seeing real exploitation attempts - this one installs a Bitcoin miner! Patch your hosts ASAP!

Infosec Exchange

@GossiTheDog

../../ directory traversal

What year is it?!

Bugtraq: IIS %c1%1c remote command execution

@GossiTheDog This is kinda disconcerting. I mean, these are essentially 90s/early 2000s web app sec 101 vulns. Have we not made *any* progress in the last 20 years? OK, I mean, we're using Python now for invoking web shells, not PHP, but other than that...
@GossiTheDog I'm getting a gateway error for this link. Did they take the article down?

@GossiTheDog @buffaloverflow IIRC, this is actually how mitre used to ask people to do it ages past, though it's been a few years since that was changed (with the cve.org split I think?).

Which seems crazy but I think they were just aiming to get companies to buy in.

@GossiTheDog @buffaloverflow another good example on how not to handle the situation as a vendor.
@GossiTheDog @buffaloverflow Oh - now I’m confused. I was not aware that the external ICT produced any output, apart from the summary number of files, etc. How do I get the ICT output file?

@dezz @GossiTheDog @buffaloverflow

I think it only produces a file if it finds mismatched files or an issue?

@Daithig That makes sense. Thanks
@GossiTheDog not any more I’m afraid. GitHub made me take it down as they received a complaint.
@buffaloverflow @GossiTheDog You could accidentally create a magnet link for the file and make it available to anyone/researcher that needs access to the file. They'd have a job getting that taken down
@buffaloverflow @GossiTheDog what was the basis of their complaint? Is there actually a legitimate claim that prevents it existing or did github just fold at the first sign of trouble because ivanti legal made sad trombone noises? (I am game to try hosting it)

@GossiTheDog No response from our critical infrastructure guys.

Meanwhile, the boss said that she'll inform DANS (a state security agency here; something like a combination of the FBI and the NSA; deals with cyber crimes and other stuff too) and scolded me for trying to contact the vulnerable company.

Apparently, this is not safe to do here. According to her, another colleague did that once - reported a vulnerability to a company that had vulnerable machines - and the company sent him a couple of bouncers to "discourage him form poking our computers". I kid you not.

@GossiTheDog same has been true for the last 5 years.

@GossiTheDog Are you using the watchTowr Labs method?

I used that to scan the machine at our critical infrastructure company. Not only is the machine indeed vulnerable but it also has an SSL certificate that has expired 101 days ago, which means that literally nobody is paying attention to it.

No wonder my e-mail went unanswered...

@GossiTheDog Three days since I've notified the critical infrastructure guys here that one of their machines is vulnerable. So far, no sign that they've read my e-mail. Oh, well.
@GossiTheDog Thank you so much for the info.
@GossiTheDog have you come across any insights on how to "search" for this new ConnectAround attacks in logs?
@GossiTheDog that's 4 twigs and a pretty rock, tyvm

@GossiTheDog I get at least 5 twigs, and sometimes a pile of dirt!

You're so rude.

@GossiTheDog Sometimes they spit in the dirt to remind me how good I have it for being the only security SME and also doing my standard T3 ops work.
@GossiTheDog As someone who ran an MSP shop for a while, you speak truth.

@GossiTheDog

"We are unable to discuss the specifics of our customers."

Yeah, but there's nothing stopping them from providing a wealth of general details that wouldn't out the affected customers at all.

@dangoodin @GossiTheDog You'd think after all of us, collectively, in the infosec community roasting every poor response for 10 years+ they'd learn that being SAFELY transparent is always the correct response.

This is a scummy response that taints them even further in my eyes and I will resist using any of their products, services, or anything in the future based on this sort of behavior.

I am not alone in that line of thinking and it may not be a big impact, but it adds up the more people think like I do.

@GossiTheDog vendors you should absolutely not be customers of.
@GossiTheDog I just checked Bulgaria's exposure to this and there are just a handful - but, holly fuck, one of them is critical infrastructure (the power grid).
@GossiTheDog I appreciate the shit out of you and the work you do, man. And I want you to know that. Posts like this have cut through and are incredibly valuable to the community.
@GossiTheDog I had to use html:”Pulse Secure” to find the one I was looking for, Shodan did not have the product facet for it and it had a slightly different value for p.