CVE-2024-36130

9.8 CRITICAL

📋 TL;DR

This vulnerability allows an unauthorized attacker on the same network to bypass authentication in Ivanti EPMM's web component and execute arbitrary commands on the underlying operating system. It affects all Ivanti Endpoint Manager for Mobile (EPMM) versions prior to 12.1.0.1, enabling full system compromise.

💻 Affected Systems

Products:
  • Ivanti Endpoint Manager for Mobile (EPMM)
Versions: All versions prior to 12.1.0.1
Operating Systems: Linux (appliance OS)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires network access to the EPMM appliance web interface. Applies to both on-premises and cloud deployments.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the EPMM appliance allowing installation of persistent backdoors, data exfiltration, and lateral movement to connected endpoints and networks.

🟠

Likely Case

Attackers gain root/system-level access to the appliance, enabling credential theft, configuration manipulation, and deployment of malware to managed mobile devices.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the EPMM appliance itself, though complete compromise of that system remains possible.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CVSS 9.8 indicates trivial exploitation with high impact. Network access is the only requirement.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 12.1.0.1

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-for-Mobile-EPMM-July-2024

Restart Required: Yes

Instructions:

1. Backup EPMM configuration and data. 2. Download EPMM 12.1.0.1 from Ivanti portal. 3. Apply update via EPMM admin interface. 4. Restart appliance. 5. Verify version and functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to EPMM appliance to authorized administrative networks only

Firewall Rules

linux

Block all non-essential inbound traffic to EPMM web ports (typically 443, 8443)

iptables -A INPUT -p tcp --dport 443 -s TRUSTED_NET -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Isolate EPMM appliance on dedicated VLAN with strict firewall rules allowing only necessary administrative access
  • Implement network monitoring and intrusion detection specifically for EPMM appliance traffic

🔍 How to Verify

Check if Vulnerable:

Check EPMM version in admin interface under Settings > About. If version is below 12.1.0.1, system is vulnerable.

Check Version:

Connect to EPMM admin interface and navigate to Settings > About page

Verify Fix Applied:

Confirm version shows 12.1.0.1 or higher in admin interface and test administrative functions work normally.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts to EPMM web interface
  • Unexpected command execution in system logs
  • Changes to EPMM configuration from unknown sources

Network Indicators:

  • Unusual traffic patterns to EPMM web ports from non-admin networks
  • Command and control traffic originating from EPMM appliance

SIEM Query:

source="epmm" AND (event_type="authentication_failure" OR event_type="command_execution")

🔗 References

📤 Share & Export