--- licence_title: Creative Commons Attribution 4.0 International (CC-BY 4.0) licence_link: https://creativecommons.org/licenses/by/4.0/ licence_restrictions: https://cert.europa.eu/legal-notice licence_author: CERT-EU, The Cybersecurity Service for the European Union institutions, bodies, offices and agencies title: 'Ivanti vTM Critical Authentication Bypass Vulnerability' number: '2024-078' version: '1.0' original_date: 'August 13, 2024' date: 'August 14, 2024' --- _History:_ * _14/08/2024 --- v1.0 -- Initial publication_ # Summary On August 13, 2024, Ivanti disclosed a critical authentication bypass vulnerability, **CVE-2024-7593**, affecting the Ivanti Virtual Traffic Manager (vTM). This flaw allows remote, unauthenticated attackers to bypass authentication and create rogue administrator accounts, posing a significant security risk. The vulnerability is due to an incorrect implementation of the authentication algorithm. # Technical Details The vulnerability, tracked as `CVE-2024-7593`, is caused by an incorrect authentication algorithm, enabling attackers to bypass the authentication process on Internet-exposed vTM admin panels. Exploitation could lead to unauthorised access and control over the affected system. # Affected Products | Product Name | Affected Version(s) | Resolved Version(s) | Patch Availability | |---------------|--------------------|---------------------|---------------------| | Ivanti Virtual Traffic Manager | 22.2 | 22.2R1 | Available | | Ivanti Virtual Traffic Manager | 22.3 | 22.3R3 | Week of August 19th | | Ivanti Virtual Traffic Manager | 22.3R2 | 22.3R3 | Week of August 19th | | Ivanti Virtual Traffic Manager | 22.5R1 | 22.5R2 | Week of August 19th | | Ivanti Virtual Traffic Manager | 22.6R1 | 22.6R2 | Week of August 19th | | Ivanti Virtual Traffic Manager | 22.7R1 | 22.7R2 | Available | # Recommendations CERT-EU strongly recommends updating to the latest patched version of Ivanti vTM. Additionally, restrict access to the management interface by binding it to an internal network or private IP address to reduce the attack surface. # References [1]