Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Ivanti Connect Secure Under Active Attack - CISA Issues
Ivanti Connect Secure Under Active Attack - CISA Issues
NEWS

Ivanti Connect Secure Under Active Attack - CISA Issues

CISA has issued an emergency directive requiring federal agencies to mitigate Ivanti Connect Secure vulnerabilities within 48 hours as active exploitation...

Dylan H.

Security Engineer

January 15, 2026
3 min read

CISA Issues Emergency Directive for Ivanti Vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA) has issued Emergency Directive 26-02, requiring all federal agencies to mitigate critical Ivanti Connect Secure vulnerabilities within 48 hours following evidence of widespread exploitation.

Emergency Directive Overview

CISA's directive requires agencies to:

  1. Immediately identify all Ivanti Connect Secure instances
  2. Apply available mitigations or disconnect devices
  3. Reset credentials for all affected users
  4. Report compromise indicators within 24 hours

Vulnerabilities Under Exploitation

Two vulnerabilities are being actively chained:

CVE-2026-0178 (Critical - CVSS 10.0)

  • Type: Authentication bypass
  • Impact: Unauthenticated access to admin interface
  • Exploited: Yes, in the wild

CVE-2026-0179 (High - CVSS 8.2)

  • Type: Command injection
  • Impact: Remote code execution
  • Exploited: Yes, chained with CVE-2026-0178

Attack Campaign Details

Mandiant's threat intelligence indicates:

  • Attribution: Multiple threat actors, including nation-states
  • Targets: Government, defense, critical infrastructure
  • Goal: Persistent access for espionage
  • Scope: Thousands of devices compromised globally

Timeline

  • Jan 8: Ivanti notified of vulnerabilities
  • Jan 10: Patches released
  • Jan 12: Active exploitation confirmed
  • Jan 14: CISA emergency directive issued
  • Jan 15: Exploitation reaches mass scale

Affected Products

ProductVersionsStatus
Connect Secure9.x, 22.xVulnerable
Policy SecureAllVulnerable
ZTA GatewaysAllVulnerable

Detecting Compromise

Integrity Checker Tool

Ivanti released an integrity checking tool:

# Run Ivanti's ICT tool
# Download from Ivanti security portal
./IntegrityCheckerTool.sh

Indicators of Compromise

Check for:

# Suspicious files
/data/runtime/tmp/*.py
/home/perl/*.pm
/data/runtime/cockpit/webserver/*
 
# Modified binaries
/home/bin/curl
/home/bin/compcheckresult.cgi
 
# Suspicious processes
perl -e '...'
python /tmp/*.py

Log Analysis

# Review for unusual patterns:
- Authentication from unexpected locations
- Admin access at unusual times
- Large data transfers
- New admin accounts created

Mitigation Steps

If Patches Available

  1. Apply patches immediately
  2. Reset all user passwords
  3. Revoke and reissue certificates
  4. Review access logs

If Patches Not Yet Applied

  1. Implement mitigation XML (from Ivanti)
  2. Disable external access if possible
  3. Enable enhanced logging
  4. Monitor for IoCs

If Compromise Suspected

  1. Isolate the device immediately
  2. Preserve forensic evidence
  3. Assume all credentials compromised
  4. Report to CISA (federal) or FBI IC3

Impact Assessment

Compromised VPN appliances provide attackers:

  • Access to internal networks
  • Visibility into VPN user credentials
  • Platform for lateral movement
  • Persistence mechanism
  • Intelligence on network architecture

CISA Resources

CISA has published:

  • Technical mitigation guidance
  • Forensic analysis playbook
  • Indicator of compromise list
  • Recovery procedures

Recommendations for All Organizations

Even non-federal organizations should:

  1. Inventory all Ivanti products
  2. Patch or mitigate immediately
  3. Hunt for signs of compromise
  4. Prepare for credential reset
  5. Monitor for unusual activity

Expert Analysis

"This is one of the most significant VPN vulnerabilities we've seen since the SolarWinds campaign," stated a Mandiant researcher. "Organizations need to assume they may be compromised and act accordingly."


Sources: CISA, Mandiant, Ivanti Security Advisory

#Ivanti#VPN#CISA#Emergency Directive#Critical Infrastructure

Related Articles

CISA Loses 62% of Workforce as DHS Shutdown Guts America's

A partial DHS shutdown since February 14 has furloughed 1,453 of CISA's 2,341 employees, halting vulnerability scanning, threat advisories, and critical...

5 min read

FBI Warns Russian Intelligence Targeting Signal and WhatsApp in Mass Phishing Campaign

FBI and CISA alert warns Russian state actors have compromised thousands of messaging accounts belonging to US government officials, military personnel,...

4 min read

CISA Adds Zimbra XSS and SharePoint RCE to KEV; Cisco FMC Zero-Day Tied to Ransomware

CISA added actively exploited Zimbra Collaboration Suite and Microsoft SharePoint vulnerabilities to its Known Exploited Vulnerabilities catalog on March...

7 min read
Back to all News