CVE-2024-29826

8.8 HIGH

📋 TL;DR

An unauthenticated SQL injection vulnerability in Ivanti EPM Core server allows attackers on the same network to execute arbitrary code. This affects Ivanti EPM 2022 SU5 and earlier versions, potentially leading to full system compromise.

💻 Affected Systems

Products:
  • Ivanti Endpoint Manager (EPM)
Versions: 2022 SU5 and earlier
Operating Systems: Windows Server (EPM Core server deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: Core server component specifically affected; requires network access to the EPM server

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with administrative privileges, data exfiltration, lateral movement across the network, and persistent backdoor installation.

🟠

Likely Case

Unauthorized database access, credential theft, and execution of arbitrary commands on the EPM server.

🟢

If Mitigated

Limited impact with proper network segmentation, but still potential for database compromise within the segmented zone.

🌐 Internet-Facing: LOW (requires same network access, not directly internet exploitable)
🏢 Internal Only: HIGH (unauthenticated attacker on internal network can achieve RCE)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection to RCE chain likely requires specific payload construction but follows common patterns

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2022 SU6 or later

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-May-2024

Restart Required: Yes

Instructions:

1. Download latest EPM patch from Ivanti portal. 2. Backup current configuration. 3. Apply patch following Ivanti documentation. 4. Restart EPM services. 5. Verify successful update.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to EPM Core server to only necessary administrative systems

Web Application Firewall

all

Deploy WAF with SQL injection rules in front of EPM server

🧯 If You Can't Patch

  • Implement strict network ACLs to limit access to EPM server to trusted IPs only
  • Monitor EPM server logs for SQL injection patterns and unusual database queries

🔍 How to Verify

Check if Vulnerable:

Check EPM version in administration console: if version is 2022 SU5 or earlier, system is vulnerable

Check Version:

Check via EPM web interface or review installation logs

Verify Fix Applied:

Verify EPM version shows 2022 SU6 or later in administration console

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in EPM logs
  • Multiple failed authentication attempts followed by complex queries
  • Database error messages containing SQL syntax

Network Indicators:

  • Unusual outbound connections from EPM server
  • SQL payloads in HTTP requests to EPM endpoints

SIEM Query:

source="epm_logs" AND ("sql" OR "query" OR "syntax") AND ("error" OR "unusual" OR "malformed")

🔗 References

📤 Share & Export