CVE-2024-29824

8.8 HIGH

📋 TL;DR

An unauthenticated SQL injection vulnerability in Ivanti EPM Core server allows attackers on the same network to execute arbitrary code. This affects Ivanti EPM 2022 SU5 and earlier versions. Attackers can potentially gain full control of affected systems.

💻 Affected Systems

Products:
  • Ivanti Endpoint Manager (EPM)
Versions: 2022 SU5 and earlier
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: Core server component only, requires network access to the EPM server

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise leading to data theft, ransomware deployment, lateral movement across the network, and persistent backdoor installation.

🟠

Likely Case

Unauthenticated attackers gaining administrative access to the EPM server, allowing them to deploy malware, steal credentials, and pivot to other systems.

🟢

If Mitigated

If network segmentation and proper access controls are in place, impact may be limited to the EPM server itself without lateral movement.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CISA has added this to their Known Exploited Vulnerabilities catalog, indicating active exploitation in the wild

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2022 SU6 or later

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-May-2024

Restart Required: Yes

Instructions:

1. Download Ivanti EPM 2022 SU6 or later from the Ivanti portal. 2. Backup current configuration and database. 3. Run the installer on the EPM server. 4. Restart the server after installation completes.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to the EPM server to only trusted administrative systems

Firewall Rules

windows

Implement strict firewall rules to limit connections to the EPM server

netsh advfirewall firewall add rule name="Block EPM Ports" dir=in action=block protocol=TCP localport=1433,8080,8443 remoteip=any

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the EPM server from other critical systems
  • Deploy web application firewall (WAF) with SQL injection protection rules in front of the EPM server

🔍 How to Verify

Check if Vulnerable:

Check Ivanti EPM version in the web interface or via registry: HKEY_LOCAL_MACHINE\SOFTWARE\LANDesk\ManagementSuite\Version

Check Version:

reg query "HKLM\SOFTWARE\LANDesk\ManagementSuite" /v Version

Verify Fix Applied:

Verify version is 2022 SU6 or later and test SQL injection attempts are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in EPM logs
  • Failed authentication attempts followed by SQL errors
  • Unexpected process creation from EPM service

Network Indicators:

  • SQL injection patterns in HTTP requests to EPM server
  • Unusual outbound connections from EPM server

SIEM Query:

source="epm_logs" AND ("sql error" OR "injection" OR "syntax error")

🔗 References

📤 Share & Export