Ivanti Neurons ITSM Vulnerabilities Could Allow Session Persistence
好的,我现在需要帮用户总结一篇文章,控制在100字以内。用户的要求很明确,不需要特定的开头,直接写内容描述。首先,我得仔细阅读文章内容。 文章主要讲的是Ivanti Neurons平台发现了两个新的ITSM漏洞,分别是CVE-2026-4913和CVE-2026-4914。这两个漏洞可能导致攻击者在特定条件下保留对企业系统的访问权限。漏洞影响的是版本2025.3及以下的on-premises和云部署环境。 接下来,我需要提取关键信息:漏洞名称、影响范围、风险等级、修复版本以及建议措施。同时,文章提到没有已知的利用案例,这可能对用户来说是个好消息。 然后,我要把这些信息浓缩到100字以内。需要注意用词简洁明了,确保所有重要点都涵盖进去。比如,可以提到攻击者可能绕过会话终止控制或注入恶意脚本。 最后,检查一下字数是否符合要求,并确保内容准确无误。这样用户就能快速了解文章的核心内容了。 </think> Ivanti Neurons ITSM平台发现两个漏洞(CVE-2026-4913和CVE-2026-4914),可能使攻击者在特定条件下保留对企业系统的访问权限。漏洞影响版本2025.3及以下的on-premises和云部署环境。修复版本为2025.4,云环境已自动更新,on-premises需手动升级。目前无已知利用案例。 2026-4-15 08:44:16 Author: thecyberexpress.com(查看原文) 阅读量:20 收藏

A newly disclosed set of ITSM vulnerabilities in Ivanti Neurons has been reported. The flaws could allow attackers to retain access to enterprise systems under certain conditions. The issues, tracked as CVE-2026-4913 and CVE-2026-4914, affect Ivanti’s Neurons for IT Service Management (ITSM) platform. 

Ivanti recently published the security advisory outlining these two vulnerabilities. These flaws could enable remote authenticated attackers to hijack or persist in user sessions, potentially maintaining unauthorized access even after administrative actions such as account deactivation. 

The vulnerabilities affect both on-premises and cloud deployments running version 2025.3 and earlier. While the risks are notable, Ivanti stated that, at the time of disclosure on April 14, 2026, there is no evidence to suggest active exploitation in real-world attacks. 

In its advisory, the company noted: “We are not aware of any customers being exploited by these vulnerabilities at the time of disclosure.” The vulnerabilities were identified and reported through a responsible disclosure program. 

Technical Breakdown of ITSM Vulnerabilities 

The two vulnerabilities, CVE-2026-4913 and CVE-2026-4914, have distinct behaviors but share a reliance on some level of authenticated access or user interaction. 

CVE-2026-4913: Session Persistence After Account Deactivation 

The first flaw, CVE-2026-4913, is classified as an “improper protection of an alternate path” vulnerability (CWE-424). It affects Ivanti Neurons for ITSM versions prior to 2025.4 and carries a CVSS score of 5.7 (Medium), with the vector:
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N. 

report-ad-banner

This vulnerability allows a remote authenticated attacker to retain access to the system even after their account has been disabled. In practice, this could enable a user with previously valid credentials to continue interacting with the platform through an alternate access path, bypassing expected session termination controls. 

CVE-2026-4914: Stored XSS and Session Data Exposure 

The second issue, CVE-2026-4914, is a stored cross-site scripting (XSS) vulnerability (CWE-79) with a CVSS score of 5.4 (Medium). Its vector is:
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N. 

This flaw allows a remote authenticated attacker to inject malicious scripts that may execute in another user’s session, provided user interaction occurs. Successful exploitation could result in limited information disclosure from other sessions, posing a risk to sensitive operational data within the ITSM environment. 

Affected Versions and Fix Timeline 

Both vulnerabilities impact Ivanti Neurons for ITSM version 2025.3 and earlier across deployment models: 

  • On-premise deployments: Versions 2025.3 and prior are affected, with fixes available in version 2025.4 via the Ivanti License System (ILS).  
  • Cloud deployments: Versions 2025.3 and earlier were also impacted; however, Ivanti applied fixes automatically to all cloud environments on December 12, 2025.  

The patched release, version 2025.4, addresses both CVE-2026-4913 and CVE-2026-4914.

Mitigation Guidance for Ivanti Neurons Users 

To reduce exposure to these vulnerabilities, Ivanti recommends that organizations update their systems to version 2025.4 as soon as possible. The mitigation steps differ depending on the deployment type. 

For cloud customers using Ivanti Neurons, no action is required, as the company has already implemented the necessary fixes across hosted environments. This proactive update ensures that cloud users are protected against both CVE-2026-4913 and CVE-2026-4914. 

In contrast, organizations running on-premises deployments must take manual action. Administrators and security teams are advised to log into the Ivanti License System and apply the 2025.4 update without delay. 

Detection and Support Considerations 

At present, Ivanti has not identified any indicators of compromise associated with these vulnerabilities, largely due to the absence of known exploitation. As a result, organizations may not have specific forensic markers to determine whether their systems were targeted. 

For organizations requiring assistance, Ivanti recommends submitting a support request through its Success Portal to address any concerns related to Ivanti Neurons, CVE-2026-4913, or CVE-2026-4914. 


文章来源: https://thecyberexpress.com/itsm-vulnerabilities-ivanti/
如有侵权请联系:admin#unsafe.sh