Ivanti Releases Urgent Fix for Critical Sentry RCE Vulnerability

-

Sentry RCE Vulnerability

Ivanti has disclosed particulars of a vital distant code execution flaw impacting Standalone Sentry, urging prospects to use the fixes instantly to remain protected towards potential cyber threats.

Tracked as CVE-2023-41724, the vulnerability carries a CVSS rating of 9.6.

“An unauthenticated menace actor can execute arbitrary instructions on the underlying working system of the equipment throughout the similar bodily or logical community,” the corporate mentioned.

Cybersecurity

The flaw impacts all supported variations 9.17.0, 9.18.0, and 9.19.0, in addition to older variations. The corporate mentioned it has made out there a patch (variations 9.17.1, 9.18.1, and 9.19.1) that may be downloaded through the usual obtain portal.

It credited Vincent Hutsebaut, Pierre Vivegnis, Jerome Nokin, Roberto Suggi Liverani and Antonin B. of NATO Cyber Safety Centre for “their collaboration on this situation.”

Ivanti emphasised that it is not conscious of any prospects affected by CVE-2023-41724, and added that “menace actors with out a legitimate TLS consumer certificates enrolled by EPMM can’t straight exploit this situation on the web.”

Patched together with CVE-2023-41724 is one other vital shortcoming impacting on-premises variations of Neurons for ITSM (CVE-2023-46808, CVSS rating: 9.9) that would allow authenticated distant attacker to carry out arbitrary file writes and acquire code execution.

“An authenticated distant consumer can carry out file writes to the ITSM server,” Ivanti mentioned. “Profitable exploitation can be utilized to write down information to delicate directories which can enable attackers execution of instructions within the context of an online software’s consumer.”

The vulnerability, which impacts variations 2023.3, 2023.2, and 2023.1, has been already addressed in cloud environments.

Ivanti has needed to battle a gentle steam of safety flaws in its software program for the reason that begin of the yr, with a few of them topic to exploitation by at the very least three totally different suspected China-linked cyber espionage clusters tracked as UNC5221, UNC5325, and UNC3886, in response to Mandiant.

Cybersecurity

The event comes as SonarSource revealed a mutation cross-site scripting (mXSS) flaw impacting an open-source e-mail consumer referred to as Mailspring aka Nylas Mail (CVE-2023-47479) that might be exploited to bypass sandbox and Content material Safety Coverage (CSP) protections and obtain code execution when a consumer replies to or forwards a malicious e-mail.

“mXSS takes benefit of that by offering a payload that appears harmless initially when parsing (in the course of the sanitization course of) however mutates it to a malicious one when re-parsing it (within the remaining stage of displaying the content material),” safety researcher Yaniv Nizry mentioned.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

ULTIMI POST

Most popular