Untitled attachment
https://media.infosec.exchange/infosec.exchange/media_attachments/files/111/760/913/613/954/532/original/24ded0a82e0f3d4b.png
Scanning for vulnerable Ivanti Connect Secure (CVE-2023-46805 & CVE-2024-21887) instances has been added to our daily scan list. 6809 found vulnerable for 2024-01-15 scans using methodology from
@watchtowrcyber
- https://labs.watchtowr.com/welcome-to-2024-the-sslvpn-chaos-continues-ivanti-cve-2023-46805-cve-2024-21887/
More details: https://shadowserver.org/what-we-do/network-reporting/vulnerable-http-report/
These are instances that we believe have NOT applied the mitigation provided by Ivanti: https://forums.ivanti.com/s/article/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US
IP data will start being reported out tomorrow (2024-01-16) along with Dashboard stats updates.
Subscribe for free vulnerability data (and more) for your network: https://shadowserver.org/what-we-do/network-reporting/get-reports/
GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.
All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.