• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • About Us
    SEARCH
IT Infrastructure, Mobility, Network Security, News

Patch Now: Pulse Connect Secure Vulnerabilities Actively Exploited

Public and private-sector security experts are sounding the alarm about actively exploited vulnerabilities in Ivanti Pulse Connect Secure products.

April 21, 2021 Zachary Comeau Leave a Comment

Pulse Connect Secure Vulnerability

Ivanti, FireEye, the U.S. Cybersecurity and Infrastructure Agency and other security experts are sounding the alarm about vulnerabilities in Ivanti Pulse Connect Secure products that have been exploited since at least June 2020 and a dozen malware families associated with the exploits.

According to Ivanti, which offers the Pulse Connect Secure VPN appliances, the company recently  discovered that a limited number of customers have experienced evidence of compromise on their Pulse Connect Secure appliances, and the company is working with forensic experts including Mandiant/FireEye, CISA, Stoz Friedberg and others to investigate.

The team noted four issues, including three vulnerabilities that were patched in 2019 and 2020.

However, there is a new issue discovered just this month that has impacted “a very limited number of customers,” the Pulse Connect Secure team said. That vulnerability is tracked as CVE-2021-2289 and is an authentication bypass vulnerability that can allow an unauthenticated user to perform remote arbitrary file execution on the Pulse Connect Secure gateway.

CISA’s alert to the private sector came as the agency directed federal civilian agencies using the affected products to run the Pulse Secure Integrity Tool and take other actions. The Pulse Secure team developed the tool to help customers determine if they’re impacted by these issues.

According to FireEye’s blog on the issue, a Chinese-backed hacking team is believed to be behind these exploits that are targeting U.S. defense companies. The actors are suspected to have obtained administrator-level access to the appliances through previously disclosed Pulse Secure vulnerabilities, and other intrusions were due to the new vulnerability.

Read Next: FBI, CISA Warn Of Threat Actors Targeting Old Fortinet FortiOS Vulns

The company says it observed the threat actor, called UNC2630, harvesting credentials from various Pulse Secure VPN login flows and used those legitimate credentials to move around in the victim environments.

Here’s more from FireEye:

We observed UNC2630 harvesting credentials from various Pulse Secure VPN login flows, which ultimately allowed the actor to use legitimate account credentials to move laterally into the affected environments. In order to maintain persistence to the compromised networks, the actor utilized legitimate, but modified, Pulse Secure binaries and scripts on the VPN appliance. This was done to accomplish the following:

  1. Trojanize shared objects with malicious code to log credentials and bypass authentication flows, including multifactor authentication requirements. We track these trojanized assemblies as SLOWPULSE and its variants.
  2. Inject webshells we currently track as RADIALPULSE and PULSECHECK into legitimate Internet-accessible Pulse Secure VPN appliance administrative web pages for the devices.
  3. Toggle the filesystem between Read-Only and Read-Write modes to allow for file modification on a typically Read-Only filesystem.
  4. Maintain persistence across VPN appliance general upgrades that are performed by the administrator.
  5. Unpatch modified files and delete utilities and scripts after use to evade detection.
  6. Clear relevant log files utilizing a utility tracked as THINBLOOD based on an actor defined regular expression.

FireEye says it also observed another threat actor that could possibly be related using certain malware at a European organization last month, but did not observe the malware used against U.S. defense companies. However, they do share similar characteristics and carry out similar functions.

For more technical analysis and mitigations, read CISA’s alert and FireEye’s blog.

Tagged With: Cybersecurity, Ivanti, Pulse Connect Secure

Related Content:

  • Microsoft Loop IT What You Need to Know About Microsoft Loop
  • YAMAHA UC ADECIA Yealink Yamaha UC Partners With Yealink for Audio &…
  • Microsoft, ChatGPT, GPT-4, GPT-3.5 What’s New With ChatGPT and Generative AI This…
  • CISA Ransomware CISA Wants You To Report Anything You Know…

Free downloadable guide you may like:

  • Four IT Trends That Will Define 2023Expert Series: Four IT Trends That Will Define 2023

    Learn about four key technologies we identified as critical to your IT organization’s success in 2023, as well as how to invest in new innovations emerging from each.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

Four IT Trends That Will Define 2023
Expert Series: Four IT Trends That Will Define 2023

Learn about four key technologies we identified as critical to your IT organization’s success in 2023, as well as how to invest in new innovations ...

Harnessing the Power of Digital Signage
Harnessing the Power of Digital Signage

Choosing the best solutions for messaging, branding, and communicating in today’s content-everywhere landscape

Blueprint Series Cover: What works for hybrid work
Blueprint Series: What Works for Hybrid Work

Download this free resource to learn about how IT leaders can effectively manage and implement a hybrid work model.

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSTERMS OF USEPRIVACY POLICY

© 2023 Emerald X, LLC. All rights reserved.