CVE-2019-12373

9.0 CRITICAL

📋 TL;DR

This vulnerability in Ivanti LANDESK Management Suite allows remote attackers to access administrator passwords through improper access control and open directories. It affects organizations using the vulnerable version of the endpoint management software, potentially exposing administrative credentials.

💻 Affected Systems

Products:
  • Ivanti LANDESK Management Suite
  • Ivanti Endpoint Manager
Versions: 10.0.1.168 Service Update 5
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web interface component of the management suite.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrator credentials, leading to complete compromise of the management infrastructure, lateral movement across the network, and potential ransomware deployment.

🟠

Likely Case

Attackers steal administrator passwords, gain privileged access to the management console, and compromise managed endpoints.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the management server itself.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the management interface but no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.0.1.168 Service Update 6 or later

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-for-LANDESK-Management-Suite

Restart Required: Yes

Instructions:

1. Download the latest service update from Ivanti support portal. 2. Backup current configuration. 3. Apply the update following Ivanti's installation guide. 4. Restart the LANDESK services.

🔧 Temporary Workarounds

Restrict Network Access

all

Limit access to the LANDESK management interface to trusted IP addresses only

Configure firewall rules to restrict access to port 443/TCP (or your configured HTTPS port) to authorized management stations only

Disable Directory Listing

windows

Configure IIS to prevent directory browsing on the LANDESK web directories

In IIS Manager, select the LANDESK site, open Directory Browsing feature, and set to Disabled

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the LANDESK server from untrusted networks
  • Change all administrator passwords and implement multi-factor authentication where possible

🔍 How to Verify

Check if Vulnerable:

Check if the LANDESK web interface is accessible and if directory browsing is enabled on sensitive paths

Check Version:

Check the version in the LANDESK console under Help > About, or examine the installed programs list in Windows

Verify Fix Applied:

Verify the installed version is 10.0.1.168 Service Update 6 or later and test that password files are no longer accessible

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to LANDESK web directories
  • Failed authentication attempts followed by successful directory browsing

Network Indicators:

  • External IP addresses accessing LANDESK web interface paths containing 'password' or 'admin'

SIEM Query:

source="LANDESK" AND (url="*password*" OR url="*admin*") AND response_code=200

🔗 References

📤 Share & Export