Description |
FortiGuard Incident Response (FGIR) service have seen campaigns involving various zero days targeting Ivanti Cloud Services Appliance (CSA) for initial access.
CVE-2024-8963 is a path traversal vulnerability in Ivanti Cloud Services Appliance (CSA) which allows unauthenticated attackers to access restricted functionality.
The following versions are affected:
|
||||||
CVE ID | CVE-2024-9379 (https://nvd.nist.gov/vuln/detail/CVE-2024-9379) CVE-2024-9380 (https://nvd.nist.gov/vuln/detail/CVE-2024-9380) CVE-2024-9381 (https://nvd.nist.gov/vuln/detail/CVE-2024-9381) CVE-2024-8963 (https://nvd.nist.gov/vuln/detail/CVE-2024-8963) CVE-2024-8190 (https://nvd.nist.gov/vuln/detail/CVE-2024-8190) |
||||||
NDR Cloud Detection Rule | FortiNDR Cloud v25.1.e+
|
||||||
Playbook | N/A | ||||||
Threat Hunting | FortiNDR Cloud users can use the following IOCs from Fortinet to hunt for “Ivanti Cloud Services Appliance Zero-Day Attack” related activities. IOC source: https://www.fortiguard.com/outbreak-ioc?tag=ivanti%20csa%20zero-day%20attack All IOCs listed above have been added to Threat Intelligence Intel. |
||||||
Suricata Coverage |
Customers can create custom investigation/detections using the Suricata signatures below: 2057138 -> ET WEB_SPECIFIC_APPS Ivanti Cloud Service Appliance Authenticated Command Injection (CVE-2024-9380) 2056685 -> ET EXPLOIT Ivanti Cloud Services Appliance Path Traversal Exploit Attempt (CVE-2024-8963) 2055984 -> ET WEB_SPECIFIC_APPS Ivanti Cloud Service Appliance Authenticated Command Injection (CVE-2024-8190) |
||||||
Other Fortinet Products |
For more details regarding mitigating the vulnerability by utilizing Fortinet products, please refer to: https://www.fortiguard.com/outbreak-alert/ivanti-csa-zero-day-attack |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.