CVE-2024-22058

7.8 HIGH

📋 TL;DR

This vulnerability allows a low-privilege local user with the Ivanti EPM Agent installed to exploit a buffer overflow and execute arbitrary code with elevated system permissions. It affects Ivanti Endpoint Manager (EPM) 2021.1 and older versions. Attackers can escalate privileges from a standard user account to SYSTEM/administrator level.

💻 Affected Systems

Products:
  • Ivanti Endpoint Manager (EPM)
Versions: 2021.1 and older versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the Ivanti EPM Agent to be installed on the system. The vulnerability is in the agent component that runs with elevated privileges.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with SYSTEM/administrator privileges, enabling installation of persistent malware, credential theft, lateral movement across the network, and complete control of affected endpoints.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, install additional malicious software, access sensitive data, and maintain persistence on compromised systems.

🟢

If Mitigated

Limited impact if proper endpoint security controls detect buffer overflow attempts or privilege escalation behaviors, though successful exploitation still grants elevated access.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring an attacker to already have local user access to the system.
🏢 Internal Only: HIGH - Once an attacker gains initial access to a system (through phishing, credential theft, etc.), they can exploit this vulnerability to escalate privileges and move laterally within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access with low privileges. The buffer overflow (CWE-122) suggests relatively straightforward exploitation once the vulnerability details are understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Ivanti EPM 2021.2 and newer

Vendor Advisory: https://forums.ivanti.com/s/article/CVE-2024-22058-Privilege-Escalation-for-Ivanti-Endpoint-Manager-EPM

Restart Required: Yes

Instructions:

1. Download Ivanti EPM 2021.2 or newer from the Ivanti portal. 2. Deploy the update to all affected endpoints. 3. Restart systems to complete the installation. 4. Verify the agent version is updated to 2021.2 or later.

🔧 Temporary Workarounds

Restrict local user access

windows

Limit local user accounts on systems with Ivanti EPM Agent to only trusted administrators

Implement application control

windows

Use application whitelisting to prevent execution of unauthorized binaries that might be used in exploitation

🧯 If You Can't Patch

  • Remove Ivanti EPM Agent from systems where it's not essential
  • Implement strict endpoint detection and response (EDR) rules to monitor for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check the Ivanti EPM Agent version. If it's 2021.1 or older, the system is vulnerable.

Check Version:

Check the agent version in the Ivanti EPM console or look at the agent installation directory properties.

Verify Fix Applied:

Verify the Ivanti EPM Agent version is 2021.2 or newer. Check that the agent service is running properly.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation with SYSTEM privileges from user accounts
  • Buffer overflow exceptions in application logs
  • Failed privilege escalation attempts

Network Indicators:

  • Unusual outbound connections from systems after local user activity
  • Lateral movement attempts from recently compromised systems

SIEM Query:

EventID=4688 AND NewProcessName contains 'cmd.exe' OR 'powershell.exe' AND SubjectUserName NOT IN (admin_users) AND TokenElevationType=2

🔗 References

📤 Share & Export