CVE-2024-29828

8.0 HIGH

📋 TL;DR

An authenticated SQL injection vulnerability in Ivanti EPM Core server allows attackers on the same network to execute arbitrary code. This affects Ivanti EPM 2022 SU5 and earlier versions. Attackers must have valid credentials and network access to exploit this vulnerability.

💻 Affected Systems

Products:
  • Ivanti Endpoint Manager (EPM)
Versions: 2022 SU5 and prior versions
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access and network connectivity to the EPM Core server.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining administrative privileges, data exfiltration, and lateral movement across the network.

🟠

Likely Case

Database compromise leading to sensitive information disclosure, privilege escalation, and potential code execution on the EPM server.

🟢

If Mitigated

Limited impact with proper network segmentation, strong authentication controls, and input validation preventing successful exploitation.

🌐 Internet-Facing: LOW - Requires authenticated access and same network location, making internet-facing exploitation unlikely.
🏢 Internal Only: HIGH - Authenticated internal attackers can exploit this to gain elevated privileges and execute arbitrary code.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

SQL injection vulnerabilities typically have low exploitation complexity once the injection point is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2022 SU6 or later

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-May-2024

Restart Required: Yes

Instructions:

1. Download the latest patch from Ivanti support portal. 2. Apply the patch to all affected EPM Core servers. 3. Restart the EPM services. 4. Verify the patch was successfully applied.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to EPM Core servers to only authorized management systems and administrators.

Input Validation Enhancement

all

Implement additional input validation and parameterized queries at the application layer.

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the EPM Core server
  • Enhance monitoring and logging of SQL queries and authentication attempts to the EPM system

🔍 How to Verify

Check if Vulnerable:

Check Ivanti EPM version in the administration console. If version is 2022 SU5 or earlier, the system is vulnerable.

Check Version:

Check Ivanti EPM Console → Help → About for version information

Verify Fix Applied:

Verify the EPM version shows 2022 SU6 or later in the administration console after patching.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL query patterns in EPM logs
  • Multiple failed authentication attempts followed by successful login
  • Unexpected database schema modifications

Network Indicators:

  • Unusual SQL traffic patterns to EPM database
  • Multiple SQL error responses from EPM server

SIEM Query:

source="epm_logs" AND (sql_error OR sql_injection OR "unexpected query")

🔗 References

📤 Share & Export