SHARE
Facebook X Pinterest WhatsApp

CISA Warns of Exploited Ivanti Flaw: Urgent Patch Needed

CISA warns of active exploitation of a critical Ivanti Endpoint Manager flaw. Urgent patch required to prevent cyberattacks and data breaches.

Oct 8, 2024
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is sounding the alarm about a serious vulnerability in the Ivanti Endpoint Manager software that has been weaponized by cybercriminals. This critical-severity flaw could allow hackers to gain unauthorized access to computers and networks, potentially leading to data theft, ransomware attacks, and other malicious activities.

CISA urges organizations using Ivanti Endpoint Manager to immediately apply the security patch released in May 2024 to address this vulnerability. Delaying the update could put your systems at risk. For more information and guidance, please visit the CISA website.

In a recent advisory, CISA stated that it has added the Ivanti Endpoint Manager bug to its catalog of exploited vulnerabilities based on “evidence of active exploitation.”

The agency emphasized that “These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.” They further noted that CISA “strongly urges” organizations outside the federal sphere to focus on addressing the security flaws listed in the Known Exploited Vulnerabilities Catalog as a matter of priority.

A vulnerability in the wild and a forced fix for the problem

Ivanti released an updated advisory regarding the security flaw on Tuesday, stating that it “has confirmed exploitation of CVE-2024-29824 in the wild.”

The company acknowledged that “At the time of this update, we are aware of a limited number of customers who have been exploited.”

Government agencies have been given a strict deadline of October 23 to address and fix vulnerable systems. This order comes from the highest levels of cybersecurity authority in the government and underscores the urgency of the situation.

While this alert is primarily aimed at government agencies, it serves as a stark warning for all organizations worldwide. The cybersecurity community strongly advises that businesses and institutions of all sizes should prioritize fixing this security issue as soon as possible. This proactive approach is crucial to defend against ongoing and potential future attacks.

CISA’s latest warning comes after months of other attacks

In recent months, the cybersecurity landscape has been rocked by a series of attacks targeting Ivanti’s products. Hackers have been exploiting multiple security flaws in various Ivanti tools, including their Virtual Private Network (VPN) systems and other critical security infrastructure. These attacks have been particularly concerning because they’ve exploited “zero-day” vulnerabilities – weaknesses that were unknown even to Ivanti until they were actively being used by attackers.

The situation became even more alarming last month when Ivanti issued a warning about a new tactic being used by cybercriminals. Attackers were found to be chaining together two recently discovered (and supposedly fixed) security issues in Ivanti’s Cloud Services Appliance. By combining these vulnerabilities, they were able to launch sophisticated attacks on systems that hadn’t yet been updated with the latest security patches.

Responding to this series of challenges, Ivanti made a public announcement in September. The company stated that they are actively working to overhaul their processes for identifying and disclosing security issues. Their goal is to significantly improve their ability to detect potential vulnerabilities earlier and address emerging threats more rapidly.

To put the scale of this issue into perspective, it’s worth noting Ivanti’s extensive reach in the IT world. The company collaborates with over 7,000 partner organizations to deliver its IT management and security solutions. These tools are used by more than 40,000 companies globally, spanning a wide range of industries and sizes. This extensive customer base highlights the potential widespread impact of these security issues and the importance of swift, coordinated action to address them.

Businesses these days have a strong need to simplify and automate patch management. Vulnerabilities are a big opening for hackers to strike – read on to find out how managed service providers (MSPs) have an opportunity to help.

thumbnail Allison Francis

Allison is a contributing writer for Channel Insider, specializing in news for IT service providers. She has crafted diverse marketing, public relations, and online content for top B2B and B2C organizations through various roles. Allison has extensive experience with small to midsized B2B and channel companies, focusing on brand-building, content and education strategy, and community engagement. With over a decade in the industry, she brings deep insights and expertise to her work. In her personal life, Allison enjoys hiking, photography, and traveling to the far-flung places of the world.

Recommended for you...

SailPoint Intros Accelerated Application Management Solution
Jordan Smith
Aug 22, 2025
ConnectWise Partners with Proofpoint on Security in Asio
Jordan Smith
Aug 22, 2025
RegScale CRO on Channel Growth in Risk & Compliance
Victoria Durgin
Aug 22, 2025
Manny Rivelo on Evolving Channel & How MSPs Can Get Ahead
Victoria Durgin
Aug 20, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.