Other

Pulse Secure / Ivanti VPN Zero-Day Exploitation by APT5 (US Defense Industrial Base)

πŸ“… 2021-01-01 🏒 Pulse Connect Secure VPN (Pulse Secure / Ivanti) πŸ”Ž CVE-2021-22893 Β· CVE-2019-11510 Β· CVE-2020-8260
Primary Source β†—

Incident Details

In April 2021, Mandiant (FireEye) and CISA disclosed that at least two Chinese APT groups (tracked as UNC2630 and UNC2717, attributed to APT5 / MANGANESE) had been exploiting zero-day and N-day vulnerabilities in Pulse Connect Secure VPN appliances since at least mid-2020. The primary zero-day, CVE-2021-22893, allowed unauthenticated remote code execution. Targets included US defense contractors, financial organizations, and government agencies. The attackers deployed multiple sophisticated malware families including SLOWPULSE, RADIALPULSE, HARDPULSE, and QUIETPULSE to maintain persistent access and bypass authentication. CISA issued Emergency Directive 21-03 requiring all federal agencies to run Ivanti’s Integrity Checker Tool and report affected devices. At least 12 US organizations were confirmed compromised. The attackers demonstrated deep knowledge of Pulse Secure’s internal authentication code, suggesting prior access to the VPN software’s source code or extensive research. The incident demonstrated the severe risk of VPN appliances as initial access vectors β€” particularly for nation-state attackers willing to invest in zero-day research.

Technical Details

Initial Attack Vector
Multiple Chinese APT groups (UNC2630 / APT5, and others) exploited CVE-2021-22893 and related zero-day vulnerabilities in Pulse Connect Secure VPN appliances to gain unauthorized access to targeted organizations' networks without authentication
Vendor / Product
Pulse Connect Secure VPN (Pulse Secure / Ivanti)
CVE / GHSA References
CVE-2021-22893 CVE-2019-11510 CVE-2020-8260

Timeline

  1. 2021-01-01 Breach occurred
  2. 2021-04-20 Publicly disclosed
  3. 2021-04-20 Customers notified