Active Exploitation of Ivanti Connect Secure Zero-Day Vulnerabilities (CVE-2024-21887)
CriticalFebruary 25, 2026

Active Exploitation of Ivanti Connect Secure Zero-Day Vulnerabilities (CVE-2024-21887)

Critical authentication bypass and command injection vulnerabilities in Ivanti Connect Secure VPN are being actively exploited in the wild. Threat actors are deploying web shells and maintaining persistence in compromised environments.

GovernmentDefenseTechnologyFinancial ServicesHealthcareCritical Infrastructure
📈

Executive Summary

Mandiant and Ivanti have disclosed active exploitation of two zero-day vulnerabilities (CVE-2024-21887 and CVE-2024-21888) affecting Ivanti Connect Secure (ICS) and Ivanti Policy Secure (IPS) products. The vulnerabilities allow unauthenticated attackers to bypass authentication and execute arbitrary commands on affected systems. Threat actors are exploiting these vulnerabilities to deploy web shells, establish persistence, and potentially conduct data theft operations. The campaign shows signs of sophisticated threat actor involvement, with evidence of reconnaissance and post-exploitation activities dating back to December 2023. Ivanti has released mitigation guidance and plans to issue patches in a phased approach throughout January 2024.

Key Findings
  • Mandiant and Ivanti have disclosed active exploitation of two zero-day vulnerabilities (CVE-2024-21887 and CVE-2024-21888) affecting Ivanti Connect Secure (ICS) and Ivanti Policy Secure (IPS) products
  • The vulnerabilities allow unauthenticated attackers to bypass authentication and execute arbitrary commands on affected systems
  • Threat actors are exploiting these vulnerabilities to deploy web shells, establish persistence, and potentially conduct data theft operations
  • The campaign shows signs of sophisticated threat actor involvement, with evidence of reconnaissance and post-exploitation activities dating back to December 2023

Overview

Two critical zero-day vulnerabilities have been discovered in Ivanti Connect Secure VPN appliances, allowing unauthenticated attackers to bypass authentication mechanisms and execute arbitrary commands. The vulnerabilities are being actively exploited in the wild by sophisticated threat actors.

The vulnerabilities affect all supported versions of Ivanti Connect Secure (9.x and 22.x) and Ivanti Policy Secure products.

Affected Vulnerabilities

  • CVE-2024-21887: Authentication Bypass
  • CVE-2024-21888: Command Injection

Technical Analysis

The authentication bypass vulnerability (CVE-2024-21887) allows attackers to access restricted resources without valid credentials. When chained with the command injection vulnerability (CVE-2024-21888), attackers can achieve remote code execution on affected systems.

Attack Chain

  • Initial access through authentication bypass
  • Deployment of web shells for persistence
  • Lateral movement within compromised networks
  • Potential data exfiltration activities

Impact Assessment

The vulnerabilities pose a critical risk to organizations using Ivanti Connect Secure VPN solutions. Successful exploitation could lead to:

  • Unauthorized access to internal networks
  • Data theft and intellectual property compromise
  • Installation of additional malware
  • Network persistence
  • Lateral movement to other systems

Recommendations

Organizations should take immediate action to protect their environments:

  • Apply Ivanti's external mitigation tool immediately
  • Monitor for signs of compromise using provided IoCs
  • Implement network segmentation around VPN appliances
  • Prepare for emergency patching when updates become available
  • Review VPN access logs for suspicious activity
  • Reset all credentials if compromise is suspected

Indicators of Compromise

File Paths

  • /home/webserver/htdocs/dana-na/css/
  • /home/webserver/htdocs/dana-cached/

Web Shell Signatures

  • check.php
  • dana-cached.php
  • dana-na.php
GovernmentDefenseTechnologyFinancial ServicesHealthcareCritical Infrastructure
IvantiConnect SecureVPNZero-dayAuthentication bypassCommand injectionWeb shellRemote code executionCVE-2024-21887CVE-2024-21888
📅February 25, 2026
🕒1h ago
🔗2 sources

Related Briefs

Widespread Supply Chain Attacks Targeting PyPI and npm Package Repositories
CriticalFeb 25, 2026

Widespread Supply Chain Attacks Targeting PyPI and npm Package Repositories

Multiple malicious packages discovered in PyPI and npm repositories executing credential theft and crypto mining payloads. Supply chain attacks leverage typosquatting and dependency confusion techniques to compromise development environments.

Salt Typhoon APT Campaign Targets US Telecommunications Infrastructure
CriticalFeb 25, 2026

Salt Typhoon APT Campaign Targets US Telecommunications Infrastructure

Chinese state-sponsored threat actor Salt Typhoon (aka Bronze Silhouette) conducts persistent intrusion campaign against US telecommunications providers. The group employs sophisticated living-off-the-land techniques and custom malware to maintain long-term access to critical infrastructure.

Mass VMware ESXi Ransomware Campaign Targeting Virtual Infrastructure
CriticalFeb 10, 2026

Mass VMware ESXi Ransomware Campaign Targeting Virtual Infrastructure

Large-scale ransomware campaign exploiting VMware ESXi vulnerabilities to encrypt virtual machines and disrupt business operations. Attackers leverage CVE-2021-21974 to compromise unpatched systems globally.