Ivanti Struggles to Deliver Critical Patches for Exploited VPN Vulnerabilities

Cybersecurity company Ivanti is facing significant challenges in delivering promised patches for critical vulnerabilities in their Connect Secure VPN appliances. This delay has put organizations at risk that utilize these appliances for secure virtual private networks.

Ivanti acknowledges missed deadline

In a recent update to their advisory, Ivanti admitted to missing the deadline for delivering the necessary patches. The company cited concerns regarding the security and quality of each software patch release as the reason behind the delay. This setback impacts the targeted release of patches for supported versions, subsequently affecting all future patch releases.

Impact of patch delays

The delayed release of these critical patches has far-reaching consequences for organizations that rely on Ivanti’s VPN appliances. The absence of official fixes complicates the strict deadlines set by the US government’s cybersecurity agency, CISA, for Federal Civilian Executive Branch (FCEB) agencies to apply available fixes, detect infections, and share indicators of compromise.

Exploitation of vulnerabilities by a Chinese hacking team

The urgency to deliver these patches arises from the recent discovery made by Volexity. They uncovered a Chinese government-backed hacking team leveraging two zero-day vulnerabilities in Ivanti’s VPN appliances. These vulnerabilities, identified as CVE-2023-46805 and CVE-2024-21887, have already been exploited by attackers to gain unauthorized access to US organizations.

The consequences for US organizations and government agencies

The delay in receiving official patches severely hampers the ability of US government agencies to protect their systems and data. CISA had issued an emergency directive requiring federal agencies to start deploying available fixes by January 22. This deadline is rapidly approaching, and the absence of patches puts agencies at a higher risk of being compromised.

CISA Emergency Directive

The emergency directive from CISA emphasizes the need for agencies to implement Ivanti’s published mitigation immediately to prevent future exploitation. However, the inability to access official patches poses a challenge to effectively comply with this directive. Organizations are left with limited options to mitigate the vulnerabilities and safeguard their valuable assets.

Description of the vulnerabilities

CVE-2023-46805 and CVE-2024-21887, the vulnerabilities targeted by the Chinese hacking team, pose significant risks to organizations using Ivanti’s VPN appliances. Exploiting these vulnerabilities allowed attackers to bypass security measures and gain unauthorized access to sensitive information. The implications of such breaches are profound and can lead to data theft, financial loss, and reputational damage.

Evading detection

Volexity researchers discovered that the attackers went to great lengths to evade detection by Ivanti’s Integrity Checker Tool. They modified legitimate components within the system and made specific changes aimed at bypassing security measures. These sophisticated tactics allowed the hackers to stay hidden while exploiting the vulnerabilities.

Pre-Patch Mitigations and Instructions from Ivanti

Understanding the urgency for protection, Ivanti has released pre-patch mitigations and instructions to help organizations minimize attack surfaces. These measures aim to provide temporary relief until the official patches become available. It is crucial for organizations to follow these guidelines diligently to mitigate the risks associated with the exploited vulnerabilities.

The struggle faced by Ivanti in delivering critical patches for their Connect Secure VPN appliances highlights the persistent challenges that organizations face in maintaining robust cybersecurity. The urgency in addressing these vulnerabilities cannot be understated, especially given the active exploitation observed by the Chinese hacking team. Organizations and government agencies must prioritize implementing proper security measures and diligently follow the mitigation instructions provided by Ivanti until the official patches are released. Only through prompt action and collaboration can organizations effectively protect their systems and data from potential breaches and an ever-evolving threat landscape.

Explore more

The Future of CX Is Simplicity and Trust, Not Tech

With decades of experience helping organizations navigate change through technology, HRTech expert Ling-Yi Tsai has a unique perspective on the evolving landscape of customer experience. Her work in HR analytics and technology integration provides a crucial lens for understanding how internal systems impact external customer satisfaction. Today, she joins us to discuss the critical shifts in consumer behavior and technology

Nissan Vendor Breach Exposes 21,000 Customer Records

The intricate web of third-party partnerships that underpins modern corporate operations has once again highlighted a critical vulnerability, this time affecting a regional dealership of the global automaker Nissan Motor Corporation. A security incident originating not from Nissan’s own systems but from a compromised server managed by a contractor, Red Hat, resulted in the exposure of personal information belonging to

New GPT-5.2-Codex Is a Leap in Agentic Coding and Security

The long-held image of a software developer meticulously crafting lines of code in isolation is rapidly being redrawn by the introduction of a new kind of collaborator, one that does not just suggest syntax but can independently manage entire, complex engineering projects from conception to deployment. This evolution marks a significant turn in software development, where artificial intelligence is transitioning

Candidate Rejected After Five Rounds for Asking About Salary

A six-week journey through a company’s labyrinthine interview process concluded not with a job offer, but with a stark rejection notice triggered by a single, fundamental question: “What is the salary range?” This incident, detailed in a now-viral social media post, has become a flashpoint in the ongoing conversation about hiring practices, exposing a deep disconnect between what companies expect

Researchers Debut World’s Smallest Programmable Robots

Today we’re speaking with Dominic Jainy, an IT professional whose work at the intersection of AI, machine learning, and now, micro-robotics, is pushing the boundaries of what we thought was possible. His team’s latest creation, a swarm of programmable robots smaller than a grain of salt, is poised to revolutionize fields from medicine to manufacturing. We’ll be exploring the incredible