CVE-2023-35084

9.8 CRITICAL

📋 TL;DR

CVE-2023-35084 is a critical remote code execution vulnerability in Ivanti Endpoint Manager (formerly LANDesk Management Suite) caused by unsafe deserialization of untrusted data. Attackers can exploit this to execute arbitrary commands on affected systems without authentication. All organizations running Ivanti Endpoint Manager 2022 su3 and earlier versions are affected.

💻 Affected Systems

Products:
  • Ivanti Endpoint Manager
  • LANDesk Management Suite
Versions: 2022 su3 and all previous versions
Operating Systems: Windows Server (primary deployment), Managed endpoints across multiple OS platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. The vulnerability exists in the core management server component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands with SYSTEM privileges, install malware, exfiltrate data, and move laterally through the network.

🟠

Likely Case

Remote code execution leading to ransomware deployment, data theft, or installation of persistent backdoors on managed endpoints.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external access to vulnerable interfaces.

🌐 Internet-Facing: HIGH - The vulnerability can be exploited remotely without authentication, making internet-facing instances extremely vulnerable.
🏢 Internal Only: HIGH - Even internally, attackers who gain initial access can exploit this to escalate privileges and move laterally.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Multiple proof-of-concept exploits are publicly available. The vulnerability is actively being exploited in the wild according to security researchers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2022 su4 or later

Vendor Advisory: https://forums.ivanti.com/s/article/SA-2023-08-08-CVE-2023-35084

Restart Required: Yes

Instructions:

1. Download the latest patch from Ivanti's support portal. 2. Backup your current installation. 3. Apply the patch following Ivanti's documentation. 4. Restart the Ivanti Endpoint Manager service. 5. Verify the patch was applied successfully.

🔧 Temporary Workarounds

Network Isolation

all

Restrict network access to the Ivanti Endpoint Manager server to only trusted management networks

# Configure firewall rules to block external access to Ivanti ports (typically 80, 443, 9595)

Disable Unnecessary Services

windows

Temporarily disable the vulnerable service components if not critically needed

# Windows: sc stop "LANDesk Management Suite"
# Windows: sc config "LANDesk Management Suite" start= disabled

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the Ivanti server from internet and untrusted networks
  • Deploy application control solutions to prevent execution of unauthorized binaries on the server

🔍 How to Verify

Check if Vulnerable:

Check the installed version of Ivanti Endpoint Manager. If it's 2022 su3 or earlier, the system is vulnerable.

Check Version:

# Windows: Check registry at HKLM\SOFTWARE\LANDesk\ManagementSuite\CurrentVersion\Version or check installed programs

Verify Fix Applied:

Verify the version is 2022 su4 or later by checking the product version in the Ivanti console or installation directory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation events from the Ivanti service account
  • Suspicious network connections originating from the Ivanti server
  • Errors or warnings in Ivanti application logs related to deserialization

Network Indicators:

  • Unusual outbound connections from the Ivanti server
  • Traffic to known malicious IPs from the server
  • Exploit-specific patterns in HTTP requests to Ivanti endpoints

SIEM Query:

source="ivanti*" AND (process_name="cmd.exe" OR process_name="powershell.exe") AND user="SYSTEM"

🔗 References

📤 Share & Export