WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Passthrough: Threat Actors Exploit Multiple Vulnerabilities in Ivanti Connect Secure and Policy Secure Gateways
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Passthrough: Threat Actors Exploit Multiple Vulnerabilities in Ivanti Connect Secure and Policy Secure Gateways

Author: Chase Snow

Created: Thursday, February 29, 2024 - 18:52

Categories: Cybersecurity, Federal & State Resources, Security Preparedness

CISA released a joint Cybersecurity Advisory (CSA) today in coordination with the FBI, MS-ISAC, and multiple international partners to emphasize that cyber threat actors continue exploiting previously identified vulnerabilities in Ivanti Connect Secure and Ivanti Policy Secure gateways. The advisory was developed with the cooperation of Volexity, Ivanti, Mandiant, and other industry partners.

Of particular concern, the authoring organizations and industry partners have determined that cyber threat actors are able to deceive Ivanti’s internal and external Integrity Checker Tool (ICT), resulting in a failure to detect compromise. 

The authoring organizations encourage network defenders to:

  1. Assume that user and service account credentials stored within the affected Ivanti VPN appliances are likely compromised.
  2. Hunt for malicious activity on their networks using the detection methods and indicators of compromise (IOCs) within this advisory.
  3. Run Ivanti’s most recent external ICT, and (4) apply available patching guidance provided by Ivanti as version updates become available.

Access the full CSA at CISA. 

See previous WaterISAC coverage pertaining to the Ivanti vulnerabilities:

  • Vulnerability Notification – Active Zero-Day Exploitation of Ivanti Connect Secure and Policy Secure Gateways (Update: January 16, 2024)
  • Ivanti Connect Secure Activity
  • Update January 30, 2024: (TLP:CLEAR) WaterISAC Advisory: CISA Issues Emergency Directive on Ivanti Vulnerabilities
  • Vulnerability Awareness Updates – Ivanti Patches Available, but Two New Vulnerabilities Disclosed

Additional Technical Resources:

  • Ivanti Connect (in)Secure – Revisited | Censys
  • Cutting Edge, Part 3: Investigating Ivanti Connect Secure VPN Exploitation and Persistence Attempts | Mandiant

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 1, 2026)

May 1, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

Tip of the Week – April 30, 2026

Apr 30, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) Cyber Readiness Institute Joins WaterISAC as a Community Partner to Strengthen Cyber Readiness Across the Water Sector

Apr 30, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar