描述:
Ivanti 发布了安全公告,以应对 Ivanti 产品的多个漏洞。有关漏洞的详情请参考以下网址:
https://forums.ivanti.com/s/article/Security-Advisory-May-2024
https://forums.ivanti.com/s/article/Avalanche-6-4-3-602-additional-security-hardening-and-CVE-fixed
https://forums.ivanti.com/s/article/KB-CVE-2024-22059-and-CVE-2024-22060-for-Ivanti-Neurons-for-ITSM
https://forums.ivanti.com/s/article/KB-Security-Advisory-EPM-May-2024
https://forums.ivanti.com/s/article/KB-Security-Advisory-Ivanti-Connect-Secure-Ivanti-Policy-Secure-May-2024
https://forums.ivanti.com/s/article/KB-Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-May-2024
https://forums.ivanti.com/s/article/KB-Security-Advisory-Ivanti-Secure-Access-Client-May-2024
有报告指 Ivanti Endpoint Manager (EPM) 的多个远端执行程式码漏洞 (CVE-2024-29822、CVE-2024-29823、CVE-2024-29824、CVE-2024-29825、CVE-2024-29826 及 CVE-2024-29827) 正处于被攻击的高风险。系统管理员应立即为受影响的系统安装修补程式,以减低受到网络攻击的风险。
受影响的系统:
- Ivanti Endpoint Manager (EPM) 2022 SU5 之前的版本
- Ivanti Avalanche 6.4.3.602 之前的版本
- Ivanti Connect Secure (ICS) 9.1R18.6、22.7R2 及 22.5R2.4 之前的版本
- Ivanti Policy Secure 22.7R1 之前的版本
- Ivanti Endpoint Manager Mobile (EPMM) 12.0.0.0/1、11.12.0.1 及 12.1.0.0 之前的版本
- Ivanti Neurons for ITSM 2023.1 Hotfix 2、2023.2 Hotfix 2、2023.3 Hotfix 2 及 2023.4 Hotfix 2 之前的版本
- Ivanti Secure Access Client 22.7R1 之前的版本
受影响产品的一些不再受支援及已结束的版本同样受影响,并不会获提供修补程式。系统管理员应安排升级不再受支援及已结束的版本至最新受支援的版本,或转至其他受支援的技术。
有关受影响系统的详细资料,请参阅供应商网站的相应安全公告。
影响:
成功利用这些漏洞可以在受影响的系统导致远端执行程式码、服务被拒绝、泄漏资讯、权限提升、绕过保安限制、仿冒诈骗或篡改。
建议:
现已有适用于受影响系统的修补程式。受影响系统的系统管理员应遵从供应商的建议,立即採取行动以降低风险。
进一步资讯:
- https://forums.ivanti.com/s/article/Security-Advisory-May-2024
- https://forums.ivanti.com/s/article/Avalanche-6-4-3-602-additional-security-hardening-and-CVE-fixed
- https://forums.ivanti.com/s/article/KB-CVE-2024-22059-and-CVE-2024-22060-for-Ivanti-Neurons-for-ITSM
- https://forums.ivanti.com/s/article/KB-Security-Advisory-EPM-May-2024
- https://forums.ivanti.com/s/article/KB-Security-Advisory-Ivanti-Connect-Secure-Ivanti-Policy-Secure-May-2024
- https://forums.ivanti.com/s/article/KB-Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-May-2024
- https://forums.ivanti.com/s/article/KB-Security-Advisory-Ivanti-Secure-Access-Client-May-2024
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38042
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38551
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46806 (to CVE-2023-46807)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46810
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22026
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22059 (to CVE-2024-22060)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29822 (to CVE-2024-29830)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29846
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29848