
Ivanti has launched safety updates to deal with a couple of safety flaws impacting Attach Protected (ICS), Coverage Protected (IPS), and Cloud Services and products Utility (CSA) which may be exploited to succeed in arbitrary code execution.
The record of vulnerabilities is underneath –
- CVE-2024-38657 (CVSS rating: 9.1) – Exterior keep watch over of a record title in Ivanti Attach Protected prior to model 22.7R2.4 and Ivanti Coverage Protected prior to model 22.7R1.3 permits a far off authenticated attacker with admin privileges to write down arbitrary recordsdata
- CVE-2025-22467 (CVSS rating: 9.9) – A stack-based buffer overflow in Ivanti Attach Protected prior to model 22.7R2.6 permits a far off authenticated attacker to succeed in far off code execution
- CVE-2024-10644 (CVSS rating: 9.1) – Code injection in Ivanti Attach Protected prior to model 22.7R2.4 and Ivanti Coverage Protected prior to model 22.7R1.3 permits a far off authenticated attacker with admin privileges to succeed in far off code execution
- CVE-2024-47908 (CVSS rating: 9.1) – Working machine command injection within the admin internet console of Ivanti CSA prior to model 5.0.5 permits a far off authenticated attacker with admin privileges to succeed in far off code execution

The shortcomings were addressed within the underneath variations –
- Ivanti Attach Protected 22.7R2.6
- Ivanti Coverage Protected 22.7R1.3
- Ivanti CSA 5.0.5
The corporate mentioned it isn’t acutely aware of any of the issues being exploited within the wild. On the other hand, with Ivanti home equipment being time and again weaponized by way of malicious actors, it is crucial that customers take steps to use the newest patches.
Ivanti additionally said that its edge merchandise were “focused and exploited by way of subtle danger actor assaults” and that it is making efforts to reinforce its device, put in force secure-by-design ideas, and lift the bar for doable abuse by way of adversaries.
“Whilst those merchandise don’t seem to be without equal goal, they’re more and more the path that well-resourced country state teams are focusing their effort on to aim espionage campaigns towards extraordinarily high-value organizations,” Ivanti CSO Daniel Spicer mentioned.
“Now we have enhanced interior scanning, guide exploitation and trying out features, greater collaboration and knowledge sharing with the safety ecosystem, and additional enhanced our accountable disclosure procedure, together with changing into a CVE Numbering Authority.”
The improvement comes as Bishop Fox launched complete technical main points of a now-patched safety flaw in SonicWall SonicOS (CVE-2024-53704) which may be exploited to circumvent authentication in firewalls and make allowance attackers to hijack lively SSL VPN classes in an effort to acquire unauthorized get right of entry to.
As of February 7, 2025, just about 4,500 internet-facing SonicWall SSL VPN servers stay unpatched towards CVE-2024-53704.

In a equivalent transfer, Akamai has printed its discovery of 2 vulnerabilities in Fortinet FortiOS (CVE-2024-46666 and CVE-2024-46668) that an unauthenticated attacker can exploit to succeed in denial-of-service (DoS) and far off code execution. The failings have been resolved by way of Fortinet on January 14, 2025.
Fortinet has since additionally revised its advisory for CVE-2024-55591 to spotlight any other flaw tracked as CVE-2025-24472 (CVSS rating: 8.1) that might lead to an authentication bypass in FortiOS and FortiProxy units by means of a specifically crafted CSF proxy request.
The corporate credited watchTowr Labs researcher Sonny Macdonald for locating and reporting the flaw. It is price noting that the vulnerability has already been patched along CVE-2024-55591, that means no buyer motion is needed if fixes for the latter have already been implemented.