Overview

Two critical vulnerabilities in Ivanti Connect Secure (formerly Pulse Secure) VPN appliances are being actively exploited in the wild by suspected Chinese nation-state threat actors. The flaws — an authentication bypass (CVE-2024-21887) and a command injection (CVE-2023-46805) — can be chained to achieve unauthenticated remote code execution.

Technical Details

CVE Type CVSS Exploited
CVE-2024-21887 Command Injection 9.1 Yes
CVE-2023-46805 Auth Bypass 8.2 Yes

Attackers are using the exploit chain to deploy WIREFIRE web shells and ZIPLINE passive backdoors, enabling persistent access even after factory resets.

Observed TTPs

Affected Versions

All Ivanti Connect Secure versions prior to 22.7R2.5 are vulnerable. Ivanti Policy Secure and ZTA Gateways share related attack surface.

Recommended Actions

  1. Immediately run Ivanti's Integrity Checker Tool — factory reset is insufficient if WIREFIRE is present.
  2. Apply available patches or follow Ivanti's XML mitigation workaround.
  3. Rotate all credentials accessible from or stored on the appliance.
  4. Review VPN logs for anomalous GET/POST requests to /api/v1/totp/user-backup-code/ paths.
  5. Isolate affected appliances and perform forensic review before returning to service.

Source: DailyCyberAlert intelligence synthesis from 20 years of historical threat data.