WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Vulnerability Awareness – Joint Advisory on Ivanti Exploit Chains by Suspected Chinese Threat Actors
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Vulnerability Awareness – Joint Advisory on Ivanti Exploit Chains by Suspected Chinese Threat Actors

TLP:CLEAR

Author: Chase Snow

Created: Thursday, January 23, 2025 - 14:36

Categories: Cybersecurity, Federal & State Resources, Security Preparedness

Yesterday, CISA and the FBI released a joint advisory that included technical details of at least two exploit chains used by threat actors to break into Ivanti Cloud Service Appliances (CSA). The advisory comes in response to active exploitation in Ivanti CSA of the following vulnerabilities:

  • CVE-2024-8963 – Administrative bypass
  • CVE-2024-9379 – SQL injection
  • CVE-2024-8190 – Remote code execution
  • CVE-2024-9380 – Remote code execution

Affected versions of Ivanti CSA include CSA versions 4.6x and 5.0.1. Network administrators and defenders are strongly encouraged to upgrade to the latest supported version of Ivanti CSA. Ivanti has noted that these vulnerabilities have not been exploited in the newest CSA version 5.0. Additionally, CISA released indicators of compromise (IoCs) and other forensic data encouraging network defenders to hunt for suspicious activity.

While not explicitly stated in the advisory, Google-owned Mandiant has publicly traced recent attacks in Ivanti CSA to an advanced persistent threat (APT) sub-group known as UNC5221—a suspected China-affiliated espionage actor. UNC5221 has exploited Ivanti Connect Secure VPN appliances as far back as December 2023. Access the full advisory at CISA.

Additional Resource:

FBI/CISA Share Details on Ivanti Exploits Chains: What Network Defenders Need to Know

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 7, 2026)

May 7, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness
Members Only

(TLP:GREEN) Gate 15 TARGET Report – Identity Centric Attacks: The Shift from Network to Identity as the Primary Attack Surface

May 7, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) CISA and Partners Release Guidance for Careful Adoption of Agentic AI Services

May 7, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar