Ivanti Connect Secure < 22.7R2.4 — RCE
Command injection in Ivanti Connect Secure combined with an authentication bypass (CVE-2023-46805) enables unauthenticated RCE. Apply the vendor patch — mass exploitation by multiple nation-state actors since January 2024.
Unauthenticated root code execution on the VPN gateway. Attackers have used this to deploy persistent web shells that survive factory resets, harvest VPN credentials of all users, and establish persistent footholds in enterprise networks. The persistence mechanism deployed by UNC5221 survived Ivanti's initial recommended mitigation steps.
CVE-2023-46805 is an authentication bypass in the web component of Ivanti Connect Secure. CVE-2024-21887 is a command injection vulnerability accessible to authenticated administrators. Chaining both, an unauthenticated attacker can inject OS commands with the privileges of the root user on the Ivanti appliance.
📧
Phishing link
🖼
Malicious file
🔓
Server compromised
Probably yes if any of these apply:
Mandiant identified exploitation of these vulnerabilities by at least five nation-state actor clusters (including UNC5221, believed to be China-linked) against global targets. The US CISA ordered all federal agencies to immediately disconnect Ivanti Connect Secure and Policy Secure products in January 2024 — an unprecedented directive. Thousands of organisations across defence, finance, and healthcare were compromised.
Manual remediation steps
⏱ 4 hours including factory reset, patching, and credential rotationCheck Ivanti Version
From the web admin UI:
Run Ivanti Integrity Checker
# From the Ivanti appliance CLI (SSH):
python3 /home/user/integrity-checker/pulse-check.py
# Or download the latest checker from Ivanti support portal
Immediate Mitigation
Apply the Patch
Post-Patch Actions
# Reset all VPN user passwords
# Revoke and reissue all certificates
# Review admin accounts for unauthorised additions
# Check for web shells in /data/runtime/tmp/tt/
No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.
References