Ivanti Cloud Bug Goes Under Exploit After Alarms Are RaisedIvanti Cloud Bug Goes Under Exploit After Alarms Are Raised
Three days after Ivanti published an advisory about the high-severity vulnerability CVE-2024-8190, threat actors began to abuse the flaw.
![A person typing on a laptop with a red, digital, holographic rectangle hovering over their hands reading "system hacked" A person typing on a laptop with a red, digital, holographic rectangle hovering over their hands reading "system hacked"](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt884a72199eb2fb4a/66e88dded414e54a42bb51fe/vulnerability1800_NicoElNino_alamy.jpg?width=1280&auto=webp&quality=95&format=jpg&disable=upscale)
Just days after Ivanti released an advisory regarding a high-severity vulnerability in its Cloud Service Appliance (CSA), the company is alerting customers that the flaw is now being exploited in the wild.
Ivanti initially disclosed the vulnerability, tracked as CVE-2024-8190, on Sept. 10, warning customers that it could allow unauthorized access to their devices. With a CVSS score of 7.2 out of 10, the attacker must have administrator-level privileges in order to exploit the vulnerability.
To remediate the bug, Ivanti recommended that users upgrade from Ivanti CSA 4.6 to CSA 5.0. In addition, CSA 4.6 Patch 518 customers can update to Patch 519, however, upgrading to CSA 5.0 remains the best option, the company noted.
On Sept. 13, Ivanti updated its advisory, making its customers aware that it knew of the active exploitation of the vulnerability.
"At the time of the September 13 update, exploitation of a limited number of customers has been confirmed following public disclosure," said the advisory.
Users should update to the latest version of the appliance as soon as possible.
If users find that they have been compromised before they can apply the recommended patch, according to the company, they can log a case or request a call through the Ivanti Success Portal.
About the Author
You May Also Like
Uncovering Threats to Your Mainframe & How to Keep Host Access Secure
Feb 13, 2025Securing the Remote Workforce
Feb 20, 2025Emerging Technologies and Their Impact on CISO Strategies
Feb 25, 2025How CISOs Navigate the Regulatory and Compliance Maze
Feb 26, 2025Where Does Outsourcing Make Sense for Your Organization?
Feb 27, 2025