CVE-2024-34782

7.2 HIGH

📋 TL;DR

This SQL injection vulnerability in Ivanti Endpoint Manager allows authenticated administrators to execute arbitrary SQL commands, potentially leading to remote code execution. Organizations using Ivanti EPM versions before the November 2024 security update for 2024 versions or before the November security update for 2022 SU6 are affected.

💻 Affected Systems

Products:
  • Ivanti Endpoint Manager
Versions: All versions before 2024 November Security Update or 2022 SU6 November Security Update
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated admin access to exploit

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control over the Ivanti EPM server, potentially enabling lateral movement across the network and data exfiltration.

🟠

Likely Case

Attacker with admin credentials exploits SQL injection to execute arbitrary code on the EPM server, compromising sensitive endpoint management data and potentially deploying malware.

🟢

If Mitigated

With proper network segmentation and least privilege access, impact is limited to the EPM server itself, though sensitive endpoint data remains at risk.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin credentials but SQL injection to RCE chain is typically straightforward once authenticated

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024 November Security Update or 2022 SU6 November Security Update

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2024-for-EPM-2024-and-EPM-2022

Restart Required: Yes

Instructions:

1. Download the November 2024 security update from Ivanti portal. 2. Apply the update following Ivanti's installation guide. 3. Restart the EPM server and services.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Ivanti EPM server from critical systems and restrict access to admin interfaces

Admin Access Restriction

all

Temporarily restrict admin account access to only essential personnel and implement MFA

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the EPM server
  • Enforce least privilege access controls and monitor admin account activity closely

🔍 How to Verify

Check if Vulnerable:

Check Ivanti EPM version in console: Help > About. If version is before 2024 November update or 2022 SU6 November update, system is vulnerable.

Check Version:

Check via Ivanti EPM console: Help > About menu option

Verify Fix Applied:

Verify version shows 2024 November Security Update applied or 2022 SU6 November Security Update applied in Help > About.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL query patterns in EPM logs
  • Multiple failed login attempts followed by admin access
  • Unexpected process execution from EPM service account

Network Indicators:

  • Unusual outbound connections from EPM server
  • SQL query patterns indicative of injection attempts

SIEM Query:

source="ivanti_epm" AND (event_type="sql_error" OR event_type="unusual_query")

🔗 References

📤 Share & Export