Ivanti Pulse Secure Appliances Fall Prey to Outdated Software Woes
In the ever-evolving theater of cyber war, the integrity of our digital infrastructure has come under magnified scrutiny. The latest target? Ivanti Pulse Secure appliances, a linchpin for corporate VPNs and gateways combating illicit access attempts.
Firmware is at the heart of these devices, and recent analyses, like those from Eclypsium, shine a distressing light. They reveal a software supply chain teetering on antiquated foundations. Shockingly, Ivanti’s Pulse Secure devices operate on CentOS 6.4—a system bid adieu by its maintainers back in 2020.
This discovery has not escaped the watchful eyes of opportunists. Attackers now leverage vulnerabilities like CVE-2023-46805 and CVE-2024-21893 to orchestrate their exploits. These security lapses play host to a variety of malware, undermining the very sanctuaries they aim to protect.
Compounding the issue, Rapid7 issued a PoC exploit that delivered access to a Pulse Secure appliance on a silver platter. It exposed a Pandora’s box of legacy packages and susceptible libraries akin to an invitation for cyber assaults.
Eclypsium’s investigations didn’t stop there. They turned their gaze towards the Integrity Checker Tool (ICT) by Ivanti, finding defects that could cloak malicious activities. Thus, compromised devices remained an enigma, hidden within seemingly secure networks.
Recent attacks on these vulnerabilities by UNC5221 only substantiate the vulnerability of network security devices, something UNC5221 exploited as of December 3, 2023. The nation-state group didn’t pivot from the pattern that saw diversification in exploitation by multiple threat actors.
This narrative isn’t one to settle lightly in the minds of enterprise security teams. It illustrates that security isn’t just a feat of strength but also of resilience—resilience against the passage of time and technological obsolescence.
The call to action is clear. Organizations should take the hint and utilize tools like EMBA, which serve as digital sentinels, sifting through firmware to root out the weak spots. These tools facilitate penetration testing, and dynamic analysis and render transparent reports—critical in today’s complex security landscapes.
Summoning new guardians for the digital supply chain is a must. Firms must bolster validation processes with cutting-edge technology and vigilance. Only then can networks turn from hunted to fortified bastions in the cyber realm, steadfast even as potential threats loom on the horizon.
If you enjoyed this article, please check out our other articles on CyberNow