NEW: Unlock the Future of Finance with CRYPTO ENDEVR - Explore, Invest, and Prosper in Crypto!
Crypto Endevr
  • Top Stories
    • Latest News
    • Trending
    • Editor’s Picks
  • Media
    • YouTube Videos
      • Interviews
      • Tutorials
      • Market Analysis
    • Podcasts
      • Latest Episodes
      • Featured Podcasts
      • Guest Speakers
  • Insights
    • Tokens Talk
      • Community Discussions
      • Guest Posts
      • Opinion Pieces
    • Artificial Intelligence
      • AI in Blockchain
      • AI Security
      • AI Trading Bots
  • Learn
    • Projects
      • Ethereum
      • Solana
      • SUI
      • Memecoins
    • Educational
      • Beginner Guides
      • Advanced Strategies
      • Glossary Terms
No Result
View All Result
Crypto Endevr
  • Top Stories
    • Latest News
    • Trending
    • Editor’s Picks
  • Media
    • YouTube Videos
      • Interviews
      • Tutorials
      • Market Analysis
    • Podcasts
      • Latest Episodes
      • Featured Podcasts
      • Guest Speakers
  • Insights
    • Tokens Talk
      • Community Discussions
      • Guest Posts
      • Opinion Pieces
    • Artificial Intelligence
      • AI in Blockchain
      • AI Security
      • AI Trading Bots
  • Learn
    • Projects
      • Ethereum
      • Solana
      • SUI
      • Memecoins
    • Educational
      • Beginner Guides
      • Advanced Strategies
      • Glossary Terms
No Result
View All Result
Crypto Endevr
No Result
View All Result

Ivanti warns customers of new critical flaw exploited in the wild

Ivanti warns customers of new critical flaw exploited in the wild
Share on FacebookShare on Twitter

Critical Ivanti Vulnerability Exploited by China-Based Threat Actors

Vulnerability Details

The vulnerability is a buffer overflow with a limited character space, and therefore it was initially believed to be a low-risk denial-of-service vulnerability.

Exploitation

Incident responders from Google-owned Mandiant wrote in a report that the threat actor studied the patch for the vulnerability in ICS 22.7R2.6 and uncovered through a complicated process that it was possible to exploit 22.7R2.5 and earlier to achieve remote code execution.

Affected Products

The vulnerability also impacts Ivanti Policy Secure and Ivanti Neurons ZTA gateways when they are generated and left unconnected to a ZTA controller.

Patch Availability

These products don’t have patches available yet, but active exploitation has not currently been observed and exploitation is less likely because Ivanti Policy Secure is not meant to be connected to the internet and ZTA gateways can’t be exploited when deployed in production correction.

Timeline

Ivanti estimates patches for ZTA gateways and Policy Secure will be released on April 19 and April 21, respectively. Pulse Connect Secure, being end-of-life, will not receive a patch for this issue and is already being targeted for active exploitation.

Conclusion

The critical Ivanti vulnerability has been exploited by China-based threat actors, highlighting the importance of timely patching and security measures to prevent remote code execution. It is crucial for organizations to prioritize patching and take necessary steps to protect their systems from the threat.

FAQs

Q: What is the nature of the vulnerability?

A: The vulnerability is a buffer overflow with a limited character space, initially believed to be a low-risk denial-of-service vulnerability.

Q: How was the vulnerability exploited?

A: The threat actor studied the patch for the vulnerability in ICS 22.7R2.6 and uncovered through a complicated process that it was possible to exploit 22.7R2.5 and earlier to achieve remote code execution.

Q: Which products are affected by the vulnerability?

A: Ivanti Policy Secure and Ivanti Neurons ZTA gateways when they are generated and left unconnected to a ZTA controller are impacted by the vulnerability.

Q: Are patches available for the affected products?

A: Patches for ZTA gateways and Policy Secure will be released on April 19 and April 21, respectively, but Pulse Connect Secure, being end-of-life, will not receive a patch for this issue.

Q: Is active exploitation currently being observed?

A: No, active exploitation has not currently been observed for the affected products, but Pulse Connect Secure is already being targeted for active exploitation.

cryptoendevr

cryptoendevr

Related Stories

“Ransomware, was ist das?”

“Ransomware, was ist das?”

July 10, 2025
0

Rewrite the width="5175" height="2910" sizes="(max-width: 5175px) 100vw, 5175px">Gefahr nicht erkannt, Gefahr nicht gebannt.Leremy – shutterstock.com KI-Anbieter Cohesity hat 1.000 Mitarbeitende...

BTR: AI, Compliance, and the Future of Mainframe Modernization

BTR: AI, Compliance, and the Future of Mainframe Modernization

July 10, 2025
0

Rewrite the As artificial intelligence (AI) reshapes the enterprise technology landscape, industry leaders are rethinking modernization strategies to balance agility,...

Warning to ServiceNow admins: Fix your access control lists now

Warning to ServiceNow admins: Fix your access control lists now

July 9, 2025
0

Rewrite the “This vulnerability was relatively simple to exploit, and required only minimal table access, such as a weak user...

Palantir and Tomorrow.io Partner to Operationalize Global Weather Intelligence and Agentic AI

Palantir and Tomorrow.io Partner to Operationalize Global Weather Intelligence and Agentic AI

July 9, 2025
0

Rewrite the Palantir Technologies Inc., a leading provider of enterprise operating systems, and Tomorrow.io, a leading weather intelligence and resilience...

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Bitcoin Short-Term Holder Shakeout Could Accelerate Recovery Above Key Level

Bitcoin Short-Term Holder Shakeout Could Accelerate Recovery Above Key Level

December 3, 2025
ETH briefly touches K but traders remain skeptical: Here’s why

ETH briefly touches $3K but traders remain skeptical: Here’s why

December 3, 2025
Ether Treasury Stocks Lead Crypto Recovery Gains

Ether Treasury Stocks Lead Crypto Recovery Gains

December 3, 2025
Haven – Blockchain With Biometric Authentication

Haven – Blockchain With Biometric Authentication

December 3, 2025
Here’s How Many Shiba Inu (SHIB) Tokens Were Burned in November

Here’s How Many Shiba Inu (SHIB) Tokens Were Burned in November

December 2, 2025

Our Newsletter

Join TOKENS for a quick weekly digest of the best in crypto news, projects, posts, and videos for crypto knowledge and wisdom.

CRYPTO ENDEVR

About Us

Crypto Endevr aims to simplify the vast world of cryptocurrencies and blockchain technology for our readers by curating the most relevant and insightful articles from around the web. Whether you’re a seasoned investor or new to the crypto scene, our mission is to deliver a streamlined feed of news and analysis that keeps you informed and ahead of the curve.

Links

Home
Privacy Policy
Terms and Services

Resources

Glossary

Other

About Us
Contact Us

Our Newsletter

Join TOKENS for a quick weekly digest of the best in crypto news, projects, posts, and videos for crypto knowledge and wisdom.

© Copyright 2024. All Right Reserved By Crypto Endevr.

No Result
View All Result
  • Top Stories
    • Latest News
    • Trending
    • Editor’s Picks
  • Media
    • YouTube Videos
      • Interviews
      • Tutorials
      • Market Analysis
    • Podcasts
      • Latest Episodes
      • Featured Podcasts
      • Guest Speakers
  • Insights
    • Tokens Talk
      • Community Discussions
      • Guest Posts
      • Opinion Pieces
    • Artificial Intelligence
      • AI in Blockchain
      • AI Security
      • AI Trading Bots
  • Learn
    • Projects
      • Ethereum
      • Solana
      • SUI
      • Memecoins
    • Educational
      • Beginner Guides
      • Advanced Strategies
      • Glossary Terms

Copyright © 2024. All Right Reserved By Crypto Endevr