Our reverse engineering team found a high-risk vulnerability in Ivanti Secure Access VPN, previously known as Pulse Secure VPN, that allows an attacker to obtain administrative privileges on a system which has the VPN client software installed. This means that an attacker, who has gained access to a system can, among other things, gain unrestricted access to all data on the system and disable EDR. Ivanti released a hotfix on November 9th that fixes the vulnerability . We advise installing this hotfix and following the recommendations from Ivanti immediately, if the vulnerable software is in use. At a later stage, when there is sufficient resistance, Northwave will share the details of the vulnerability.
DescriptionIvanti's Secure Access VPN, previously known as Pulse Secure VPN, is an SSL VPN solution for remote users to connect to a network from anywhere . Its setup usually consists of a server in the network, and VPN client software installed on systems that connect to the server. The vulnerability exists in the VPN client software. It can be exploited by an attacker that has low privileged access to the system which the client software is installed on, by writing a malicious payload to the Secure Access VPN kernel driver. This results in kernel code execution, with which the attacker has complete and unrestricted access to the underlying hardware of a system. Similar kernel code execution vulnerabilities are actively abused by threat actor groups such as InvisiMole, which is active in cyber espionage operations in Ukraine and Russia .
The following versions of the software are vulnerable:
- Pulse Secure VPN version 9.1R18 and lower.
- Ivanti Secure Access version 22.6R1 and lower.
ImpactWe estimate the impact of this vulnerability as high because successful exploitation could lead the attacker to execute code in the kernel of a system, for example to escalate privileges or disable defensive measures such as EDR. The confidentiality, integrity, and availability of data on the system can therefore no longer be guaranteed.
RiskNo public exploit code is currently available. However, based on the time our reverse engineering team has spent developing working exploit code, we suspect that a motivated attacker with sufficient resources could write working exploit code in a matter of days. That is why we estimate the risk of this vulnerability to be high.
What should you do?Ivanti released a Secure Access VPN hotfix to address this vulnerability . We advise installing this hotfix and following the recommendations from Ivanti immediately, if the vulnerable software is in use, to mitigate the risk.
What will Northwave do?We have already contacted Endpoint Detection & Response customers, that have the vulnerable software component installed, to mitigate the vulnerability. Clients with our EDR service will get notified when an attacker tries to exploit the vulnerability. We will monitor any developments regarding this vulnerability. If new critical information about this threat arises, we will reach out to you. You can call us by phone or send us an email if you would like additional information.
E-mail: email@example.comDo you have an incident right now? Call our CERT number: 00800 1744 0000
Disclaimer applies, see below.
Sources: https://forums.ivanti.com/s/article/Security-fixes-included-in-the-latest-Ivanti-Secure-Access-Client-Release: https://www.ivanti.com/products/connect-secure-vpn: https://web-assets.esetstatic.com/wls/2020/06/ESET_InvisiMole.pdf
Northwave has made every effort to make this information accurate and reliable. However, the information provided is without warranty of any kind and its use is at the sole risk of the user. Northwave does not accept any responsibility or liability for the accuracy, content, completeness, legality or reliability of the information provided. We shall not be liable for any loss or damage of whatever nature, direct or indirect, consequential or other, whether arising in contract, tort or otherwise, which may arise as a result of your use of, or inability to use, this information or any additional information provided by us in direct or indirect relation to the information provided here.