RSS feed source: US Computer Emergency Readiness Team

Note: The CVEs in this advisory are unrelated to vulnerabilities (CVE-2025-0282 and CVE-2025-0283) in Ivanti’s Connect Secure, Policy Secure and ZTA Gateways. For more information on mitigating CVE -2025-0282 and CVE-2025-0283, see Ivanti Releases Security Updates for Connect Secure, Policy Secure, and ZTA Gateways.

Summary

The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) are releasing this joint Cybersecurity Advisory in response to exploitation in September 2024 of vulnerabilities in Ivanti Cloud Service Appliances (CSA): CVE-2024-8963, an administrative bypass vulnerability; CVE-2024-9379, a SQL injection vulnerability; and CVE-2024-8190 and CVE-2024-9380, remote code execution vulnerabilities.

According to CISA and trusted third-party incident response data, threat actors chained the listed vulnerabilities to gain initial access, conduct remote code execution (RCE), obtain credentials, and implant webshells on victim networks. The actors’ primary exploit paths were two vulnerability chains. One exploit chain leveraged CVE-2024-8963 in conjunction with CVE-2024-8190 and CVE-2024-9380 and the other exploited CVE-2024-8963 and CVE-2024-9379. In one confirmed compromise, the actors moved laterally to two servers.

All four vulnerabilities affect Ivanti CSA version 4.6x versions before 519, and two of the vulnerabilities (CVE-2024-9379 and CVE-2024-9380) affect CSA versions 5.0.1 and below; according to Ivanti, these CVEs have not been exploited in version 5.0.[1]

Ivanti CSA 4.6 is End-of-Life (EOL) and no longer receives patches or third-party libraries. CISA and FBI strongly encourage network

Click this link to continue reading the article on the source website.

RSS feed source: US Computer Emergency Readiness Team

Participating Organization(s)

National Institutes of Health (NIH)

Components of Participating Organizations

National Institute of Mental Health (NIMH)

Funding Opportunity Title

National Cooperative Drug/Device Discovery/Development Groups (NCDDG) for the Treatment of Mental Disorders (U19 Clinical Trial Optional)

Activity Code

U19 Research Program – Cooperative Agreements

Announcement Type

Related Notices

April 4, 2024 – Overview of Grant Application and Review Changes for Due Dates on or after January 25, 2025. See Notice NOT-OD-24-084.August 31, 2022– Implementation Changes for Genomic Data Sharing Plans Included with Applications Due on or after January 25, 2023. See Notice NOT-OD-22-198.August 5, 2022– Implementation Details for the NIH Data Management and Sharing Policy. See Notice NOT-OD-22-189.

Funding Opportunity Number (FON)

Click this link to continue reading the article on the source website.

RSS feed source: US Computer Emergency Readiness Team

The U.S. Department of Commerce, National Institute of Standards and Technology (NIST) and the International Ultraviolet Association (IUVA) invite you to their jointly hosted workshop: “Advancing Ultraviolet (UV) Germicidal Efficacy Measurement

Click this link to continue reading the article on the source website.

RSS feed source: US Computer Emergency Readiness Team

Participating Organization(s)

National Institutes of Health (NIH)

Components of Participating Organizations

National Institute of Mental Health (NIMH)

Funding Opportunity Title

National Cooperative Drug/Device Discovery/Development Groups (NCDDG) for the Treatment of Mental Disorders (U01 Clinical Trial Optional)

Activity Code

U01 Research Project – Cooperative Agreements

Announcement Type

Related Notices

April 4, 2024 – Overview of Grant Application and Review Changes for Due Dates on or after January 25, 2025. See Notice NOT-OD-24-084.August 31, 2022– Implementation Changes for Genomic Data Sharing Plans Included with Applications Due on or after January 25, 2023. See Notice NOT-OD-22-198.August 5, 2022– Implementation Details for the NIH Data Management and Sharing Policy. See Notice NOT-OD-22-189.

Funding Opportunity Number (FON)

Click this link to continue reading the article on the source website.