CVE-2024-29847

9.8 CRITICAL

📋 TL;DR

This critical vulnerability allows remote unauthenticated attackers to execute arbitrary code on Ivanti EPM systems by exploiting insecure deserialization in the agent portal. Organizations using Ivanti EPM 2022 before SU6 or 2024 before the September 2024 update are affected. Attackers can gain full control of vulnerable systems without authentication.

💻 Affected Systems

Products:
  • Ivanti Endpoint Manager (EPM)
Versions: EPM 2022 before SU6, EPM 2024 before September 2024 update
Operating Systems: Windows Server (primary deployment platform)
Default Config Vulnerable: ⚠️ Yes
Notes: The agent portal component is vulnerable by default in affected versions. All deployments using these versions should be considered at risk.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise leading to data theft, ransomware deployment, lateral movement across the network, and persistent backdoor installation.

🟠

Likely Case

Remote code execution allowing attackers to install malware, steal credentials, and pivot to other systems in the environment.

🟢

If Mitigated

Limited impact if systems are isolated, patched, or have network controls preventing external access to the agent portal.

🌐 Internet-Facing: HIGH - Remote unauthenticated exploitation makes internet-facing systems immediate targets for attackers.
🏢 Internal Only: HIGH - Even internal systems are vulnerable to attackers who gain initial access through other means or insider threats.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The CVSS 9.8 score, unauthenticated nature, and remote code execution capability make this highly attractive for exploitation. While no public PoC exists at analysis time, similar deserialization vulnerabilities are frequently weaponized quickly.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: EPM 2022 SU6 or later, EPM 2024 September 2024 update or later

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Ivanti's support portal. 2. Apply EPM 2022 SU6 for 2022 deployments. 3. Apply September 2024 update for 2024 deployments. 4. Restart the EPM server and affected services. 5. Verify successful installation through the EPM console.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to the EPM agent portal (typically port 443) to only trusted management networks.

firewall rules to block external access to EPM server ports

Disable Agent Portal

windows

Temporarily disable the vulnerable agent portal component if not required for operations.

Stop the Ivanti EPM Agent Portal service via services.msc or equivalent

🧯 If You Can't Patch

  • Isolate the EPM server from internet access and restrict internal access to only necessary administrative systems.
  • Implement application control/whitelisting to prevent execution of unauthorized binaries even if RCE is achieved.

🔍 How to Verify

Check if Vulnerable:

Check EPM version in the console: Settings > About. Versions before 2022 SU6 or 2024 September update are vulnerable.

Check Version:

In EPM console: Navigate to Settings > About to view version information.

Verify Fix Applied:

Verify version shows 2022 SU6 or later, or 2024 September 2024 update or later. Check that the patch installation completed successfully in the EPM console logs.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from EPM services
  • Unexpected network connections from EPM server
  • Failed authentication attempts to agent portal followed by successful exploitation

Network Indicators:

  • Unusual outbound connections from EPM server
  • Traffic to known malicious IPs from EPM server
  • Anomalous HTTP requests to the agent portal endpoint

SIEM Query:

source="EPM_Server" AND (event_type="process_creation" AND parent_process="EPM_Service") OR (destination_port=443 AND http_user_agent CONTAINS "malicious")

🔗 References

📤 Share & Export