Skip to main content
NewsJan 10, 20242 min read

Ivanti Connect Secure Vulnerabilities: Multiple Zero-Days Under Active Exploitation

Ivanti disclosed multiple zero-day vulnerabilities in Connect Secure VPN appliances actively exploited in the wild. Here is what security teams need to know and how to respond.

By 3SN Editorial
#Ivanti#VPN#Zero-day#Remote Access#Network Security
Ivanti Connect Secure Vulnerabilities: Multiple Zero-Days Under Active Exploitation
Vulnerability Management
Jan 10, 20243SN Newsroom

Ivanti Connect Secure Vulnerabilities: Multiple Zero-Days Under Active Exploitation

Ivanti disclosed multiple zero-day vulnerabilities in Connect Secure VPN appliances actively exploited in the wild. Here is what security teams need to know and how to respond.

Ivanti Connect Secure Vulnerabilities: Multiple Zero-Days Under Active Exploitation

TL;DR

  • Ivanti disclosed multiple zero-day vulnerabilities in Connect Secure VPN appliances actively exploited by threat actors.
  • Affected organizations include government agencies and enterprises relying on remote access solutions for distributed workforces.
  • Immediate action includes applying vendor patches, hunting for indicators of compromise, and reviewing access logs for suspicious activity.

The short version

Ivanti disclosed multiple zero-day vulnerabilities affecting Connect Secure VPN appliances, with active exploitation confirmed in the wild. The vulnerabilities include an authentication bypass and command injection that allow unauthenticated attackers to gain remote access to affected systems. CISA responded with an emergency directive requiring federal agencies to disconnect compromised appliances immediately, a clear signal of the severity and active nature of the threat.

The timeline here matters. These vulnerabilities were already being exploited before public disclosure, meaning organizations without robust threat hunting capabilities may have missed initial indicators. If your environment includes Ivanti Connect Secure appliances, the priority is clear: assume compromise until proven otherwise, apply mitigations, and hunt for evidence.

Why this matters beyond a single product

VPN appliances have become a focal point for attackers because they represent a trusted path into internal networks. The shift to remote work expanded VPN deployment across organizations of all sizes, often with insufficient security hardening. When a VPN appliance is compromised, the attacker gains not just network access but often privileged credentials that can enable lateral movement across the entire environment.

This incident also highlights a broader pattern: network edge devices continue to be prime targets. Firewalls, VPNs, and remote access solutions all share common traits: they face the internet, handle authentication, and operate with elevated privileges. Security teams should evaluate their entire remote access architecture, not just patch individual vulnerabilities as they emerge.

Practical next steps for teams

Start with the CISA emergency directive and Ivanti advisories, even if you are not a federal agency. The guidance includes detection signatures and compromise indicators that apply universally. If you have Ivanti appliances, assume they may be compromised and hunt for evidence using the provided detection methods.

After patching, review your VPN architecture more broadly. Consider whether all VPN access is necessary, whether multi-factor authentication is enforced everywhere, and whether your logging captures enough detail to detect similar attacks in the future. If you only have time for one action today, prioritize patching and then run a targeted hunt for the compromise indicators published by CISA and Ivanti.

3SN perspective

Remote access is essential for modern operations, but it should not come at the cost of security. The key is making secure access feel natural for users while maintaining strong controls behind the scenes. Organizations need visibility into who is accessing what, from where, and whether that access aligns with normal patterns. When security is both protective and observable, teams can respond faster to incidents like this and reduce their overall risk exposure.

What happened

Ivanti disclosed multiple critical zero-day vulnerabilities affecting Connect Secure VPN appliances, including an authentication bypass and command injection flaw. CISA issued an emergency directive requiring federal agencies to disconnect affected appliances due to confirmed active exploitation by multiple threat actor groups.

Who’s affected

Organizations running Ivanti Connect Secure or Policy Secure gateways are impacted, particularly those with internet-facing VPN appliances. Government agencies and enterprises with remote workforces face the highest immediate risk.

What to do now

  1. Apply Ivanti's provided mitigation steps and security patches immediately per vendor guidance.
  2. Hunt for indicators of compromise using CISA-provided detection signatures and vendor security advisories.
  3. Review VPN access logs for unauthorized authentication attempts, unusual source IPs, or suspicious administrative activity.

Technical analysis

Mitigations & recommendations

critical

Apply vendor patches immediately

Deploy all Ivanti-provided patches and mitigations as soon as available. Verify patch application and appliance restart to ensure protections are active.

critical

Hunt for compromise indicators

Use CISA and Ivanti detection guidance to search for signs of exploitation, including unauthorized admin access, suspicious logins, and post-exploitation artifacts.

high

Restrict VPN exposure

Limit VPN access to specific source networks where possible, enable multi-factor authentication, and review admin account permissions for principle of least privilege.

medium

Document response actions

Maintain a timeline of patch deployment, detection activities, and any identified compromise for compliance and recovery purposes.