simontsui, 4 months ago to random AssetNote documents the process they took in reverse engineering the Ivanti Connect Secure vulnerabilities CVE-2023-46805 (Authentication Bypass) & CVE-2024-21887 (Remote Command Execution), as well as understanding potential gaps in other detection mechanisms and exploit payloads that were published. They gave a shoutout to Ron Bowes @iagox86 at @greynoise 🔗 https://www.assetnote.io/resources/research/high-signal-detection-and-exploitation-of-ivantis-pulse-connect-secure-auth-bypass-rce #AssetNote #Ivanti #ConnectSecure #zeroday #CVE202346805 #CVE202421887 #eitw #KEV #KnownExploitedVulnerabilitiesCatalog #activeexploitation
AssetNote documents the process they took in reverse engineering the Ivanti Connect Secure vulnerabilities CVE-2023-46805 (Authentication Bypass) & CVE-2024-21887 (Remote Command Execution), as well as understanding potential gaps in other detection mechanisms and exploit payloads that were published. They gave a shoutout to Ron Bowes @iagox86 at @greynoise 🔗 https://www.assetnote.io/resources/research/high-signal-detection-and-exploitation-of-ivantis-pulse-connect-secure-auth-bypass-rce
#AssetNote #Ivanti #ConnectSecure #zeroday #CVE202346805 #CVE202421887 #eitw #KEV #KnownExploitedVulnerabilitiesCatalog #activeexploitation