Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Encrypthub targets Web3 developers using fake AI platforms to deploy Fickle Stealer malware

Tesla loses its appeal to Indian loyalists – even if the masks finally deliver

Important unpaid SharePoint Zero-Day will be actively utilized and violated global organizations over the age of 75

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Ivanti Patches Are Important Faults in Connect Secure and Policy Secure – Updated Now
Identity

Ivanti Patches Are Important Faults in Connect Secure and Policy Secure – Updated Now

userBy userFebruary 12, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

February 12, 2025Ravi LakshmananNetwork Security/Vulnerabilities

Ivanti patches critical security flaws

Ivanti has released security updates to address multiple security flaws affecting Connect Secure (ICS), Policy Secure (IPS), and Cloud Service Applications (CSA).

The list of vulnerabilities is below:

CVE-2024-38657 (CVSS score: 9.1) – External control of filenames for IVANTI Connect Secure before version 22.7R2.4 and IVANTI policy is safe before version 22.7R1.3. CVE-2025-22467 (CVSS score: 9.9) – Using stack-based buffer overflow for IVANTI Connect Secure before version 22.7R2.6, remote authentication attackers will cause remote code execution CVE-2024-10644 (CVSS score: 9.1) can be realized. Code injection in Ivanti Connect protects secure before version 22.7R2.4 and IVANTI policies, and is protected before version 22.7R1.3. Injection in the Ivanti CSA administrator web console before version 5.0.5 allows remote authentication attackers with administrative rights to achieve remote code execution

Cybersecurity

The drawbacks are addressed in the following versions –

Ivanti Connect Secure 22.7R2.6 Ivanti Policy Secure 22.7R1.3 Ivanti CSA 5.0.5

The company said it is unaware of any of the defects being exploited in the wild. However, as Ivanti appliances are repeatedly weaponized by malicious actors, it is essential that users take steps to apply the latest patches.

Ivanti also said that its edge products are “targeted and exploited by sophisticated threat actor attacks,” and that its software has been improved, implementing principles of safe design, and for potential abuse by the enemy. He admitted that he was making an effort to raise the stick.

“These products aren’t the ultimate targets, but they are increasingly a route that focuses their efforts on spying on highly valued organizations,” Ivanti Cso Daniel Spicer said. said.

“We have further strengthened internal scanning, manual leveraging and testing capabilities, increased collaboration and information sharing with the security ecosystem, and further strengthened our responsible disclosure process, including becoming authorized for CVE numbers. .”

This development comes when Bishop Fox released the full technical details of the currently patched security flaws of Sonic Wall Sonicos (CVE-2024-53704). access.

As of February 7, 2025, nearly 4,500 SonicWall SSL VPN servers for the Internet remain unpublished for CVE-2024-53704.

Cybersecurity

In a similar move, Akamai announced the discovery of two vulnerabilities in Fortinet Fortios (CVE-2024-46666 and CVE-2024-46668). The defect was resolved by Fortinet on January 14, 2025.

Fortinet has revised the advisory for CVE-2024-55591, highlighting another flaw tracked as CVE-2025-24472 (CVSS score: 8.1), and via specially crafted CSF proxy requests This can lead to authentication bypassing the device.

The company evaluated Watchtowr Labs researcher Sonny MacDonald as having discovered and reported the defect. The vulnerability means that it has already been patched along with CVE-2024-55591. This means that if the latter fix has already been applied, no customer action is required.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleRussia – Ukraine War: List of Major Events – Day 1,084 | News of the Russian-Ukraine War
Next Article Tabby plans to double its valuation to $3.3 billion with $160 million in funding as it plans to go beyond BNPL
user
  • Website

Related Posts

Encrypthub targets Web3 developers using fake AI platforms to deploy Fickle Stealer malware

July 20, 2025

Important unpaid SharePoint Zero-Day will be actively utilized and violated global organizations over the age of 75

July 20, 2025

Malware injected into 6 npm package after maintainer token was stolen in a phishing attack

July 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Encrypthub targets Web3 developers using fake AI platforms to deploy Fickle Stealer malware

Tesla loses its appeal to Indian loyalists – even if the masks finally deliver

Important unpaid SharePoint Zero-Day will be actively utilized and violated global organizations over the age of 75

Malware injected into 6 npm package after maintainer token was stolen in a phishing attack

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.