Ivanti fixes critical flaws in Standalone Sentry and Neurons product, patch as soon as possible
Take action: If you are using Ivanti Standalone Sentry or self-hosted Ivanti Neurons for ITSM, plan to patch as soon as possible. While the vulnerabilities can't be exploited immediately, the barriers to exploit are not that high. Plan to patch soon.
Learn More
Ivanti has released a fix for two critical remote code execution (RCE) vulnerability in its Standalone Sentry product and it's Neurons for ITSM IT service management solution.
The issue impacting Standalone Sentry is tracked as CVE-2023-41724 (CVSS score 9.6) and could potentially allow an unauthenticated attacker to execute arbitrary commands on the operating system of an affected appliance if they are on the same physical or logical network.
All supported versions of Standalone Sentry: 9.17.0, 9.18.0, and 9.19.0, as well as older unsupported versions, are vulnerable.
Ivanti has noted that there are currently no known instances of this vulnerability being exploited in the wild. Additionally, it was mentioned that attackers lacking a valid TLS client certificate, enrolled through EPMM, cannot exploit this vulnerability over the internet.
The issue impacting Neurons for ITSM IT service management solution, is tracked as CVE-2023-46808 (CVSS score 9.9). This flaw could allow remote attackers with low-level account access to execute commands under the web application's user context. While patches for Ivanti Neurons for ITSM Cloud landscapes have already been applied, organizations with on-premises deployments are urged to update their systems as soon as possible to mitigate potential risks.
Ivanti software vulnerabilities are commonly exploited by nation-state actors, including suspected China-linked cyber espionage groups, so patching is a great choice.