內容說明:
研究人員發現Ivanti部分產品存在伺服器請求偽造(Server Side Request Forgery, SSRF)(CVE-2024-21893)漏洞,攻擊者可利用此漏洞獲取機敏資訊。該漏洞已遭駭客利用,請儘速確認並進行修補。
影響平台:
Ivanti Connect Secure 9.x與22.x版本
Ivanti Policy Secure 9.x與22.x版本
Ivanti Neurons for ZTA
處置建議:
一、官方已釋出修補,修補版本如下:
1. Ivanti Connect Secure 9.1R14.4、9.1R17.2、9.1R18.3、22.4R2.2、22.5R1.1及22.5R2.2版本
2. Ivanti Policy Secure 22.5R1.1版本
3. Ivanti Neurons for ZTA 22.6R1.3版本
二、緩解與修補方式請參考以下官方連結:
https://forums.ivanti.com/s/article/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US
參考資料:
1. https://nvd.nist.gov/vuln/detail/CVE-2024-21893
2. https://forums.ivanti.com/s/article/CVE-2024-21888-Privilege-Escalation-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure?language=en_US
3. https://forums.ivanti.com/s/article/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US