WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Vulnerability Awareness Updates – Ivanti Patches Available, but Two New Vulnerabilities Disclosed
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Vulnerability Awareness Updates – Ivanti Patches Available, but Two New Vulnerabilities Disclosed

Author: Chase Snow

Created: Thursday, February 1, 2024 - 19:44

Categories: Cybersecurity, Security Preparedness

Reminder: Action may be required if your utility uses affected versions of Ivanti Connect Secure and Policy Secure Gateways. Please have systems administrators address promptly, if they have not already.

Additionally, impacted utilities are strongly encouraged to conduct continuous threat hunting, regardless of the mitigations implemented and regardless of external or internal ICT results.

Ivanti has begun making patches widely available for some impacted products. However, two new vulnerabilities (CVE-2024-21893 and CVE-2024-21888) have also been disclosed that are now thrown into the mix, including one (CVE-2024-21893) that was exploited as a zero-day. WaterISAC has been tracking the Ivanti vulnerabilities closely and providing relevant updates. Please see below for prior notifications.

According to Ivanti, patches are available for Ivanti Connect Secure (versions 9.1R14.4, 9.1R17.2, 9.1R18.3, 22.4R2.2 and 22.5R1.1) and ZTA version 22.6R1.3. For all remaining supported versions, Ivanti has stated they will be patched on a staggered schedule, and there are also new mitigations available for download. For detailed instructions on how to apply the mitigations and patches, visit the Ivanti KB article.

Regarding the new vulnerabilities, they impact Ivanti Connect Secure, Policy Secure, and ZTA. The “zero-day” (CVE-2024-21893) exploited prior to the patch, is a server-side request forgery (SSRF) vulnerability which enables attackers to bypass authentication and access restricted resources. An additional flaw (CVE-2024-21888) within the web component of the gateway enables malicious actors to escalate to admin privileges. For more information, access Ivanti or Bleeping Computer.

Analyst Comment (Jennifer Lyn Walker): There has been a lot of research done on these vulnerabilities and the known activity and exploitation. Systems administrators and security analysts are encouraged to review the additional resources for greater understanding and to determine potential impact at your utility. This post from Tenable may be useful: CVE-2023-46805, CVE-2024-21887, CVE-2024-21888 and CVE-2024-21893: Frequently Asked Questions for Vulnerabilities in Ivanti Connect Secure and Policy Secure Gateways.

To help sysadmins keep track of which vulnerabilities have been patched and which are still outstanding but include mitigations, Tenable (referenced above) provides a good overview. Additionally, CISA has updated its guidance: Updated New Mitigations to Defend Against Exploitation of Ivanti Connect Secure and Policy Secure Gateways. Finally, as this situation has been evolving, it is important for sysadmins to closely track Ivanti for relevant updates and information.

Additional resources shared by WaterISAC regarding Ivanti vulnerabilities:

  • Update January 30, 2024: (TLP:CLEAR) WaterISAC Advisory: CISA Issues Emergency Directive on Ivanti Vulnerabilities
  • Ivanti Connect Secure Activity (Members Only)
  • Vulnerability Notification – Active Zero-Day Exploitation of Ivanti Connect Secure and Policy Secure Gateways (Update: January 16, 2024)

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 1, 2026)

May 1, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

Tip of the Week – April 30, 2026

Apr 30, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) Cyber Readiness Institute Joins WaterISAC as a Community Partner to Strengthen Cyber Readiness Across the Water Sector

Apr 30, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar