PatchSiren cyber security CVE debrief
CVE-2024-21887 Ivanti CVE debrief
CVE-2024-21887 affects Ivanti Connect Secure and Policy Secure and is identified by CISA as a known exploited vulnerability. CISA added it to the KEV catalog on 2024-01-10, with a remediation due date of 2024-01-22, and marked known ransomware campaign use as Known. For defenders, this is a high-priority internet-facing gateway issue: follow vendor instructions referenced by CISA, and if mitigations are not available, discontinue use of the product.
- Vendor
- Ivanti
- Product
- Connect Secure and Policy Secure
- CVSS
- Unknown
- CISA KEV
- Listed
- Original CVE published
- 2024-01-10
- Original CVE updated
- 2024-01-10
- Advisory published
- 2024-01-10
- Advisory updated
- 2024-01-10
Who should care
Security and infrastructure teams responsible for Ivanti Connect Secure/Policy Secure appliances, especially internet-facing VPN and remote access gateways; incident responders and SOC teams monitoring for active exploitation.
Technical summary
The supplied source corpus identifies CVE-2024-21887 as a command injection vulnerability in Ivanti Connect Secure and Policy Secure. CISA lists it in the Known Exploited Vulnerabilities catalog and links vendor guidance for mitigation. The available source material does not provide additional technical mechanics, affected versions, or exploit-chain details, so defenders should rely on vendor and CISA guidance for exact remediation steps.
Defensive priority
Critical
Recommended defensive actions
- Apply mitigations per Ivanti's vendor instructions referenced by CISA.
- If mitigations are unavailable, discontinue use of the affected product, per CISA guidance.
- Treat exposed Ivanti gateways as urgent internet-facing assets and prioritize remediation before the KEV due date.
- Review authentication, configuration, and system logs for signs of abnormal activity around the mitigation window.
- Track the official CVE, NVD, and CISA KEV entries for any updates to remediation guidance or scope.
Evidence notes
This debrief is limited to the supplied source corpus: the CISA KEV entry, its embedded vendor-note text, and the official CVE/NVD links. The corpus confirms the CVE identifier, product family, vulnerability class (command injection), KEV listing date (2024-01-10), due date (2024-01-22), and that known ransomware campaign use is marked 'Known'. It does not include version ranges, exploit steps, or patch specifics.
Official resources
-
CVE-2024-21887 CVE record
CVE.org
-
CVE-2024-21887 NVD detail
NVD
-
CISA Known Exploited Vulnerabilities catalog
CISA - Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
-
Source item URL
cisa_kev
Publicly disclosed in the supplied CVE metadata on 2024-01-10; CISA added the issue to the KEV catalog the same day and set a due date of 2024-01-22.