CVE-2024-34780

7.2 HIGH

📋 TL;DR

This SQL injection vulnerability in Ivanti Endpoint Manager allows authenticated administrators to execute arbitrary SQL commands, potentially leading to remote code execution. Organizations using Ivanti EPM versions before the November 2024 security updates are affected. Attackers with admin credentials can exploit this to compromise the EPM server.

💻 Affected Systems

Products:
  • Ivanti Endpoint Manager
Versions: All versions before 2024 November Security Update or 2022 SU6 November Security Update
Operating Systems: Windows Server (EPM server components)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated admin access to the EPM web interface. Both EPM 2024 and EPM 2022 branches are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full compromise of the EPM server leading to domain-wide endpoint control, credential theft, lateral movement, and persistent backdoor installation across managed endpoints.

🟠

Likely Case

Database compromise leading to sensitive information disclosure, privilege escalation, and limited code execution on the EPM server.

🟢

If Mitigated

Attack limited to authenticated admin users only, with network segmentation preventing lateral movement and EDR detecting anomalous SQL queries.

🌐 Internet-Facing: HIGH if EPM web interface is exposed to internet, as authenticated admins could exploit remotely.
🏢 Internal Only: HIGH as any authenticated admin (including compromised accounts) can exploit this vulnerability from within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

SQL injection typically has low exploitation complexity, but requires admin credentials. No public exploit code available at advisory publication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024 November Security Update for EPM 2024 or 2022 SU6 November Security Update for EPM 2022

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2024-for-EPM-2024-and-EPM-2022

Restart Required: Yes

Instructions:

1. Download the November 2024 security update from Ivanti portal. 2. Apply to EPM server. 3. Restart EPM services. 4. Verify patch installation through EPM console.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to EPM web interface to only necessary administrative networks

Admin Account Hardening

all

Implement MFA for EPM admin accounts and review admin access permissions

🧯 If You Can't Patch

  • Implement web application firewall (WAF) with SQL injection rules in front of EPM
  • Monitor for unusual SQL queries in EPM database logs and implement alerting

🔍 How to Verify

Check if Vulnerable:

Check EPM version in console: Settings > About. If version is before November 2024 updates, system is vulnerable.

Check Version:

Check EPM web interface or run: Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*Endpoint Manager*'}

Verify Fix Applied:

Verify patch installation in EPM console and check that version shows November 2024 security updates applied.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in EPM database logs
  • Multiple failed login attempts followed by admin login
  • Unexpected process execution from EPM server

Network Indicators:

  • Unusual outbound connections from EPM server
  • SQL query patterns indicative of injection attempts

SIEM Query:

source="epm_logs" AND (sql_query CONTAINS "UNION" OR sql_query CONTAINS "SELECT * FROM" OR sql_query CONTAINS "xp_cmdshell")

🔗 References

📤 Share & Export