CVE-2024-32839

7.2 HIGH

📋 TL;DR

This SQL injection vulnerability in Ivanti Endpoint Manager allows authenticated administrators to execute arbitrary SQL commands, potentially leading to remote code execution. It affects Ivanti EPM versions before the November 2024 security update for 2024 versions, or before the November 2024 security update for 2022 SU6 versions.

💻 Affected Systems

Products:
  • Ivanti Endpoint Manager
Versions: All versions before November 2024 Security Update for EPM 2024, or before November 2024 Security Update for EPM 2022 SU6
Operating Systems: Windows Server (primary deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated admin access to exploit. Affects both EPM 2024 and EPM 2022 SU6 branches.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining complete control over the EPM server, accessing sensitive endpoint data, and pivoting to other systems in the network.

🟠

Likely Case

Data exfiltration, privilege escalation, and potential lateral movement within the network environment.

🟢

If Mitigated

Limited impact due to network segmentation, strict access controls, and monitoring preventing successful exploitation.

🌐 Internet-Facing: HIGH if EPM web interface is exposed to internet, as authenticated admin accounts could be compromised.
🏢 Internal Only: HIGH due to authenticated admin access requirement and potential for lateral movement once compromised.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

SQL injection vulnerabilities are typically easy to exploit once identified. Requires admin credentials which may be obtained through other means.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: November 2024 Security Update for EPM 2024 or November 2024 Security Update for EPM 2022 SU6

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2024-for-EPM-2024-and-EPM-2022

Restart Required: Yes

Instructions:

1. Download the November 2024 security update from Ivanti portal. 2. Backup EPM database and configuration. 3. Apply the security update following Ivanti's installation guide. 4. Restart the EPM server and services. 5. Verify successful update and functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to EPM web interface to only trusted administrative networks

Admin Account Hardening

all

Implement strong password policies, MFA, and limit admin account usage

🧯 If You Can't Patch

  • Implement strict network access controls to limit EPM interface exposure
  • Enhance monitoring for SQL injection attempts and unusual admin account activity

🔍 How to Verify

Check if Vulnerable:

Check EPM version in Administration Console > About, or review installed updates in Windows Programs and Features

Check Version:

In EPM console: Help > About, or check Windows Update history

Verify Fix Applied:

Verify November 2024 security update is installed and version number matches patched release

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in EPM logs
  • Multiple failed login attempts followed by admin access
  • Unexpected database operations

Network Indicators:

  • SQL injection patterns in HTTP requests to EPM web interface
  • Unusual outbound connections from EPM server

SIEM Query:

source="epm_logs" AND ("sql" OR "database") AND ("error" OR "exception" OR "injection")

🔗 References

📤 Share & Export