CVE-2023-38042

7.8 HIGH

📋 TL;DR

This CVE describes a local privilege escalation vulnerability in Ivanti Secure Access Client for Windows. It allows authenticated low-privileged users to execute arbitrary code with SYSTEM-level privileges, potentially compromising the entire Windows system. Organizations using affected versions of Ivanti Secure Access Client on Windows are at risk.

💻 Affected Systems

Products:
  • Ivanti Secure Access Client
Versions: Specific versions not provided in description; consult Ivanti advisory for exact affected versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows versions of Ivanti Secure Access Client. Requires local authenticated access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with local user access could gain complete SYSTEM control over the Windows machine, install persistent malware, steal credentials, access sensitive data, and pivot to other systems.

🟠

Likely Case

Malicious insiders or attackers who have gained initial access through other means escalate privileges to SYSTEM to maintain persistence, disable security controls, and move laterally.

🟢

If Mitigated

With proper endpoint protection, least privilege enforcement, and network segmentation, impact is limited to the compromised host with reduced lateral movement potential.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring authenticated access to the Windows system.
🏢 Internal Only: HIGH - Once an attacker gains initial access to a Windows endpoint with Ivanti Secure Access Client, they can easily escalate to SYSTEM privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Local privilege escalation vulnerabilities typically have low exploitation complexity once initial access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Ivanti advisory for specific patched versions

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-May-2024?language=en_US

Restart Required: Yes

Instructions:

1. Review Ivanti advisory for affected versions. 2. Download and install the latest patched version of Ivanti Secure Access Client. 3. Restart affected systems. 4. Verify the update was successful.

🔧 Temporary Workarounds

Remove local user access

windows

Restrict local user access to systems running Ivanti Secure Access Client to reduce attack surface

Implement application control

windows

Use Windows Defender Application Control or similar to restrict execution of unauthorized binaries

🧯 If You Can't Patch

  • Implement strict least privilege principles - ensure users only have necessary permissions
  • Deploy endpoint detection and response (EDR) solutions to detect privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check Ivanti Secure Access Client version against affected versions listed in the Ivanti advisory

Check Version:

Check program version in Control Panel > Programs and Features or via Ivanti client interface

Verify Fix Applied:

Verify Ivanti Secure Access Client version matches or exceeds the patched version specified in the advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation with SYSTEM privileges from user contexts
  • Ivanti Secure Access Client service anomalies

Network Indicators:

  • Unusual outbound connections from systems after local privilege escalation

SIEM Query:

Process Creation where Parent Process contains 'ivanti' AND Integrity Level changes to 'System'

🔗 References

📤 Share & Export