Ivanti Connect Secure VPN vulnerability
This live blog contains information regarding a vulnerability in Ivanti Connect Secure VPN. As soon as we have an update, we’ll add it to this post. More information about possible risks and details can be found at the bottom of this blog. Last updated on January 18, 2024.

T-Update
This live blog contains information regarding a vulnerability in Ivanti Connect Secure VPN. As soon as we have an update, we’ll add it to this post. More information about possible risks and details can be found at the bottom of this blog. Last updated on January 18, 2024.
Update 18 January 2024
14:30 | On the 16th of January, cybersecurity company Rapid7 has published a blog post giving a detailed description of the vulnerability and how it can be exploited. With that, a public exploit is now available. Earlier this week an increase in scanning activity for vulnerable instances was noticed. Cybersecurity company Volexity published on the 15th of January a blog stating they identified 1700 compromised instances.
In our initial blog we only mentioned Ivanti Connect Secure, but also Ivanti Policy Secure is impacted by this vulnerability. The patch release information for this product can be found in the table below.
Background
On the 10th of January, cyber security company Volexity has published a blog describing the exploitation of two vulnerabilities in Ivanti Connect Secure VPN (formerly known as Pulse Connect Secure). The first vulnerability provides an authentication-bypass and is registered as CVE-2023-46805. The second vulnerability gives an attacker the ability to perform command-injection and is registered as CVE-2024-21887. When combined, an attacker can run commands on the system without authentication and steal configuration data, modify existing files, download files and reverse tunnel from the Ivanti Connect Secure VPN appliance.
Risk
The vulnerability CVE-2023-46805 has a CVSS score of 8.2 and CVE-2024-21887 a CVSS score of 9.1. The CVSS scale runs from 0 to 10. Scores of 8.2 and 9.1 are not critical in itself. It is the combination of the two vulnerabilities that implies a high risk of exploitation with high impact.
The CVE-2023-46805 vulnerability is an authentication bypass vulnerability. CVE-2024-21887 is a command injection vulnerability. When combined, an attacker can run commands on the system without authentication and steal configuration data, modify existing files, download files and reverse tunnel from the Ivanti Connect Secure VPN appliance.
Exploitation of CVE-2023-46805 and CVE-2024-21887 has been observed in the wild since the beginning of December 2023, but exploit code or instructions are not publicly available. Combined with the exposed character of the affected solutions, this vulnerability is very critical and must be remediated as soon as possible.
Advice
All supported versions of Ivanti Connect Secure VPN are vulnerable for CVE-2023-46805 and CVE-2024-21887, including:
- Version 9.x
- Version 22.x
Ivanti has released a workaround, while a patch is in development, eliminating the attack surface temporarily. Be aware that this workaround does degrades certain features. Please refer to the security article of Ivanti for the workaround, software patches and more details: https://forums.ivanti.com/s/article/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US
Ivanti has released a patch release overview. It is highly recommended to apply the software patch as soon as possible when released.
Sources
Sign up to receive T-Updates
Receive the latest vulnerabilities in your email every Wednesday
More than 1,000 organisations have already joined us.
