Need cloud computing? Get started now

Scanning Activity for CVE-2024-22024 (XXE) Vulnerability in Ivanti

Akamai Wave Blue

Written by

Sam Tinklenberg and Noam Atias

February 14, 2024

Sam Tinklenberg

Written by

Sam Tinklenberg

Sam Tinklenberg is a Senior Security Researcher in the Apps & APIs Threat Research Group at Akamai. Sam comes from a background in web application penetration testing and is passionate about finding and protecting against critical vulnerabilities. While he isn’t breaking web apps, Sam enjoys video and board games, being outside, and spending time with friends and family.

Noam Atias

Written by

Noam Atias

Noam Atias is a Security Researcher in the Apps & APIs Threat Research Group at Akamai.

We have seen significant scanning activity across our platform that targets this CVE.

Introduction

Over the last few weeks, Ivanti has disclosed numerous critical CVEs. The most recent — CVE-2024-22024 — is no different. Although it does not have as high a CVSS score as previous vulnerabilities, CVE-2024-22024 will still likely be a prime target for attackers.

On February 8, 2024, Ivanti published an advisory for CVE-2024-22024. Ivanti originally reported that this flaw was discovered during internal testing. However, their advisory was later updated to also give credit to watchTowr for responsibly disclosing this vulnerability.

CVE-2024-22024 is an XML external entity (XXE) injection vulnerability located within the SAML component of Ivanti Connect Secure and Ivanti Policy Secure. Successful exploitation of this vulnerability could lead to sensitive information disclosure, denial of service (DoS), server-side request forgery (SSRF), or even arbitrary code execution, depending on the underlying web application.

Observed scanning activity

We have seen significant scanning activity across our platform that targets this CVE. After the initial proof of concept (PoC) was published on February 9, 2024, a surge of scanning was observed. The scanning traffic reached its peak on February 11 and tapered off on February 12 (Figure 1).

The scanning traffic reached its peak on February 11 and tapered off on February 12 (Figure 1). Fig. 1: Timeline showing number of scanning requests per day

  • Approximately 240,000 requests 

  • 30,000 hosts targeted

  • More than 80 IPs observed sending payloads

  • Attack traffic from 11 different countries

So far, we have only been seeing payloads similar to the original PoC published by watchTowr. There have been a few variations of the original PoC but all have been “blind” out-of-band payloads that attempt to get the targeted server to interact with one of many different listening domains.

The Akamai Security Intelligence Group will continue to analyze our web application firewall (WAF) logs for new variants or a transition to weaponized payloads, and we will update this section of the blog if we discover any new information.

Mitigating with Akamai App & API Protector

Customers who are using Akamai Adaptive Security Engine in automatic mode and have the Web Platform Attack group in Deny mode are automatically protected against these attacks. Customers who are using Adaptive Security Engine in manual mode should validate that they have the Web Platform Attack group or the following individual rule in Deny mode (Figure 2):

  • 3000934 v1 — Improved Detection of Ivanti Connect Secure XXE Attack Detected (CVE-2024-22024)

Exploit attempt denied Fig. 2: Exploit attempt denied by Adaptive Security Engine rule

Summary

Akamai App & API Protector has been successfully mitigating these attack attempts against our security customers.

The most effective defense will always be to promptly apply the patches provided by the vendor. However, we understand the amount of time and effort security teams need to dedicate to identify and safely patch vulnerable software — and with the growing number of applications and fluid environments, this task requires even more time and effort.

A defense-in-depth strategy remains crucial for protecting an organization's assets from an ever-increasing number of threats. Attackers are quick to incorporate public PoCs into their attack toolsets, making the challenge for defenders even greater. Implementing a WAF, like Akamai App & API Protector, can add an additional layer of defense, which can protect against newly discovered CVEs and provide an extra buffer of security.

This blog post provides an overview of our current understanding and our recommendations given the information available. Our review is ongoing and any information herein is subject to change. You can also visit our X account for real-time updates.



Akamai Wave Blue

Written by

Sam Tinklenberg and Noam Atias

February 14, 2024

Sam Tinklenberg

Written by

Sam Tinklenberg

Sam Tinklenberg is a Senior Security Researcher in the Apps & APIs Threat Research Group at Akamai. Sam comes from a background in web application penetration testing and is passionate about finding and protecting against critical vulnerabilities. While he isn’t breaking web apps, Sam enjoys video and board games, being outside, and spending time with friends and family.

Noam Atias

Written by

Noam Atias

Noam Atias is a Security Researcher in the Apps & APIs Threat Research Group at Akamai.