Morning Overview

VPN bugs let Chinese hackers break into dozens of Ivanti customers

Chinese state-sponsored hackers exploited flaws in Ivanti’s VPN software to breach at least 119 organizations, including the company’s own data-center network, according to a new investigation. The intrusions trace back to vulnerabilities in Pulse Secure’s VPN product, which Ivanti inherited when it acquired the company in late 2020. The scale of the compromise, and the cost-cutting decisions that preceded it, raise hard questions about whether private equity-driven debt left a major security vendor unable to protect its own customers.

How Hackers Got Inside Ivanti’s Own Network

In February 2021, Ivanti discovered that Chinese hackers had already compromised Pulse Secure’s data-center network by turning the company’s own VPN software against it. The attackers exploited vulnerabilities in Pulse Secure’s product to gain access, meaning the very tool sold to protect corporate and government networks had become the entry point. Ivanti’s internal review later determined that 119 organizations were compromised through the same set of flaws. That figure captures a wide swath of victims, though public reporting has not identified specific organizations or sectors affected.

The timeline matters because Ivanti had only recently completed its acquisition of Pulse Secure. Within months of closing the deal, the company was confronting evidence that nation-state actors had been exploiting the VPN product it just bought. The breach was not a single isolated incident but a campaign, with the same vulnerability chain used repeatedly to penetrate dozens of targets. For organizations that relied on Pulse Secure’s VPN to safeguard remote access, the discovery meant their perimeter defenses had been quietly bypassed by one of the most capable threat actors in the world.

Debt, Layoffs, and Gutted Security Teams

The breach did not happen in a vacuum. Ivanti took on enormous financial obligations through its acquisition spree, and the company was saddled with $2.8 billion in debt. That financial pressure translated directly into operational cuts. Within a few years, the company was slashing budgets and gutting teams across the organization, according to the same reporting. For a company whose core product is network security, reducing headcount in engineering and security functions carries obvious risks.

Ivanti began laying off employees immediately after taking over the VPN maker in late 2020, with dismissals peaking in 2022. The timing is significant: the company was shedding staff during the same period it was dealing with evidence of Chinese intrusions and needed to patch the vulnerabilities that enabled them. When security teams shrink, the ability to audit legacy code, respond to incident reports, and ship timely patches deteriorates. The pattern suggests that debt service demands competed directly with the investment needed to harden a product already under active attack by a sophisticated adversary.

CISA’s Emergency Response in 2024

The consequences of those earlier failures became a federal crisis by early 2024. On January 10, 2024, CISA published an alert confirming that Ivanti had reported active exploitation of two critical vulnerabilities in its Connect Secure and Policy Secure gateways. The flaws were tracked as CVE-2023-46805, an authentication bypass, and CVE-2024-21887, a command injection vulnerability. Chained together, these bugs allowed attackers to bypass login protections and execute arbitrary commands on the appliance, giving them deep access to any network behind the VPN. CISA urged organizations to apply security updates immediately and warned that exploitation was already underway.

The situation escalated quickly. CISA issued Emergency Directive 24-01, which went beyond standard patch advisories. The directive imposed a forced disconnect deadline, requiring federal agencies to pull affected Ivanti appliances offline. Before any device could be returned to service, agencies had to perform a factory reset or rebuild, or upgrade to a clean image. That level of response is rare and signals that CISA judged the exploitation to be severe enough that simple patching could not guarantee a clean system. Attackers may have implanted persistent backdoors that would survive a standard software update, making a full wipe the only reliable remediation.

Why Cost-Cutting Amplified the Damage

Most coverage of the Ivanti breaches has focused on the technical details of the vulnerabilities themselves. But the more consequential story is structural. The 2021 Pulse Secure compromise and the 2024 Connect Secure crisis are not disconnected events. They represent a pattern in which a security vendor, weighed down by private equity debt, failed to invest adequately in the product lifecycle that its customers depended on. When Ivanti cut staff and budgets in the years after acquiring Pulse Secure, it reduced its capacity to audit inherited code for weaknesses, respond to threat intelligence about active exploitation, and ship patches before attackers could widen their campaigns.

The chained exploits disclosed in 2024 illustrate how understaffed teams can miss compounding risks. An authentication bypass alone is dangerous; paired with a command injection flaw, it becomes a full remote-access toolkit for an attacker. Catching that kind of vulnerability chain before adversaries weaponize it requires sustained investment in secure development, code review, and red-teaming. Instead, Ivanti was operating under the constraints of heavy leverage, with leadership focused on servicing billions in obligations rather than expanding the security engineering bench. The result was a product line that remained widely deployed, including in sensitive government environments, even as its defenses lagged behind the threat actors targeting it.

What the Ivanti Breach Reveals About Security and Private Equity

The Ivanti episode underscores a broader tension in the cybersecurity industry: the collision between long-term security needs and the short-term financial logic of leveraged buyouts. VPN appliances and remote-access gateways are not disposable consumer gadgets. They sit at the edge of critical networks, often for years, and must be maintained against evolving threats. When a firm is acquired and loaded with debt, the easiest expenses to trim are people and processes that do not immediately generate revenue, such as secure coding initiatives, internal penetration testing, and incident response readiness. The reporting on Ivanti shows how those cuts can hollow out a company’s ability to defend both itself and its customers.

For governments and enterprises, the lesson is that vendor risk cannot be evaluated solely on the basis of product features or brand reputation. Customers that depended on Ivanti’s VPNs had little visibility into the company’s capital structure, its shrinking headcount, or the internal debates over how much to spend on security. Yet those hidden factors shaped how quickly vulnerabilities were found, how thoroughly intrusions were investigated, and how decisively patches were delivered. As regulators and buyers reassess their exposure in the wake of the Chinese intrusions, Ivanti’s trajectory offers a stark case study in how financial engineering can erode the very security that network defenders are paying for.

More from Morning Overview

*This article was researched with the help of AI, with human editors creating the final content.