CVE-2024-32839
📋 TL;DR
This SQL injection vulnerability in Ivanti Endpoint Manager allows authenticated administrators to execute arbitrary SQL commands, potentially leading to remote code execution. It affects Ivanti EPM versions before the November 2024 security update for 2024 versions, or before the November 2024 security update for 2022 SU6 versions.
💻 Affected Systems
- Ivanti Endpoint Manager
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with attacker gaining complete control over the EPM server, accessing sensitive endpoint data, and pivoting to other systems in the network.
Likely Case
Data exfiltration, privilege escalation, and potential lateral movement within the network environment.
If Mitigated
Limited impact due to network segmentation, strict access controls, and monitoring preventing successful exploitation.
🎯 Exploit Status
SQL injection vulnerabilities are typically easy to exploit once identified. Requires admin credentials which may be obtained through other means.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: November 2024 Security Update for EPM 2024 or November 2024 Security Update for EPM 2022 SU6
Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2024-for-EPM-2024-and-EPM-2022
Restart Required: Yes
Instructions:
1. Download the November 2024 security update from Ivanti portal. 2. Backup EPM database and configuration. 3. Apply the security update following Ivanti's installation guide. 4. Restart the EPM server and services. 5. Verify successful update and functionality.
🔧 Temporary Workarounds
Network Segmentation
allRestrict access to EPM web interface to only trusted administrative networks
Admin Account Hardening
allImplement strong password policies, MFA, and limit admin account usage
🧯 If You Can't Patch
- Implement strict network access controls to limit EPM interface exposure
- Enhance monitoring for SQL injection attempts and unusual admin account activity
🔍 How to Verify
Check if Vulnerable:
Check EPM version in Administration Console > About, or review installed updates in Windows Programs and Features
Check Version:
In EPM console: Help > About, or check Windows Update history
Verify Fix Applied:
Verify November 2024 security update is installed and version number matches patched release
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in EPM logs
- Multiple failed login attempts followed by admin access
- Unexpected database operations
Network Indicators:
- SQL injection patterns in HTTP requests to EPM web interface
- Unusual outbound connections from EPM server
SIEM Query:
source="epm_logs" AND ("sql" OR "database") AND ("error" OR "exception" OR "injection")