Ivanti

Description

Attack data related to CVE-2023-35081

MITRE ATT&CK Techniques

ID Technique Tactic
T1190 Exploit Public-Facing Application Initial Access

Environment Details

Field Value
Environment attack_range
Directory ivanti
Test Date 2023-08-08

Datasets

The following datasets were collected during this attack simulation:

Suricata_ivanti_secure_connect_checkphase

  • Path: /datasets/attack_techniques/T1190/ivanti/suricata_ivanti_secure_connect_checkphase.log
  • Sourcetype: linux_secure
  • Source: linux_secure

Suricata_ivanti_saml

  • Path: /datasets/attack_techniques/T1190/ivanti/suricata_ivanti_saml.log
  • Sourcetype: suricata
  • Source: suricata

Suricata_ivanti_secure_connect_exploitphase

  • Path: /datasets/attack_techniques/T1190/ivanti/suricata_ivanti_secure_connect_exploitphase.log
  • Sourcetype: linux_secure
  • Source: linux_secure

Suricata_ivanti_epm

  • Path: /datasets/attack_techniques/T1190/ivanti/suricata_ivanti_epm.log
  • Sourcetype: suricata
  • Source: suricata

Suricata_ivanti_cve202335078

  • Path: /datasets/attack_techniques/T1190/ivanti/suricata_ivanti_CVE202335078.log
  • Sourcetype: suricata
  • Source: suricata

Ivanti_bookmark_web_access

  • Path: /datasets/attack_techniques/T1190/ivanti/ivanti_bookmark_web_access.log
  • Sourcetype: suricata
  • Source: suricata

Suricata_ivanti_cve202335082

  • Path: /datasets/attack_techniques/T1190/ivanti/suricata_ivanti_CVE202335082.log
  • Sourcetype: suricata
  • Source: suricata

Ivanti_vtm_nginxproxy

  • Path: /datasets/attack_techniques/T1190/ivanti/ivanti_vtm_nginxproxy.log
  • Sourcetype: nginx:plus:access
  • Source: nginx

The following detections in our security content repository use this attack data for testing:

Detection Name Type Source MITRE ATT&CK Analytic Story
Ivanti EPM SQL Injection Remote Code Execution TTP Web T1190 Ivanti EPM Vulnerabilities, GhostRedirector IIS Module and Rungan Backdoor, Hellcat Ransomware
Ivanti Connect Secure Command Injection Attempts TTP Web T1190 Ivanti Connect Secure VPN Vulnerabilities, CISA AA24-241A
Ivanti Connect Secure SSRF in SAML Component TTP Web T1190 Ivanti Connect Secure VPN Vulnerabilities
Access to Vulnerable Ivanti Connect Secure Bookmark Endpoint TTP Web T1190 Ivanti Connect Secure VPN Vulnerabilities, CISA AA24-241A
Ivanti Sentry Authentication Bypass TTP Web T1190 Ivanti Sentry Authentication Bypass CVE-2023-38035
Ivanti EPMM Remote Unauthenticated API Access CVE-2023-35082 TTP Web T1190, T1133 Ivanti EPMM Remote Unauthenticated Access
Ivanti Connect Secure System Information Access via Auth Bypass Anomaly Web T1190 Ivanti Connect Secure VPN Vulnerabilities, CISA AA24-241A
Ivanti EPMM Remote Unauthenticated API Access CVE-2023-35078 TTP Web T1190, T1133 Ivanti EPMM Remote Unauthenticated Access
Ivanti VTM New Account Creation TTP Application T1190 Ivanti Virtual Traffic Manager CVE-2024-7593, Scattered Lapsus$ Hunters, Hellcat Ransomware

Usage Instructions

Replay with Splunk Attack Data

Replay attack data with replay.py from Splunk Attack Data.

1python replay.py --dataset /datasets/attack_techniques/T1190/ivanti/suricata_ivanti_secure_connect_checkphase.log --index attack_data

Manual Import

  1. Download the dataset files from the paths listed above
  2. Configure your Splunk instance with the appropriate sourcetypes
  3. Import the logs using the Splunk Add Data wizard

Find more detections and analytics for this attack technique in our security content repository.


Source: GitHub | Version: 1.0