CVE-2024-36132
📋 TL;DR
This authentication bypass vulnerability in Ivanti EPMM allows remote attackers to access sensitive resources without proper credentials. It affects Ivanti Endpoint Manager for Mobile (EPMM) versions prior to 12.1.0.1. Organizations using vulnerable EPMM deployments are at risk of unauthorized access to mobile management systems.
💻 Affected Systems
- Ivanti Endpoint Manager for Mobile (EPMM)
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the EPMM system allowing attacker to manage all enrolled mobile devices, deploy malicious configurations, access sensitive corporate data, and pivot to internal networks.
Likely Case
Unauthorized access to administrative functions, exposure of sensitive mobile device management data, and potential credential harvesting from the EPMM platform.
If Mitigated
Limited impact with proper network segmentation, strong authentication controls, and monitoring in place, though authentication bypass still presents significant risk.
🎯 Exploit Status
The vulnerability allows unauthenticated access, suggesting relatively simple exploitation once the specific bypass method is understood.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 12.1.0.1
Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-for-Mobile-EPMM-July-2024
Restart Required: Yes
Instructions:
1. Download EPMM version 12.1.0.1 from Ivanti support portal. 2. Backup current EPMM configuration and database. 3. Apply the update following Ivanti's upgrade documentation. 4. Restart EPMM services. 5. Verify successful update and functionality.
🔧 Temporary Workarounds
Network Access Restriction
allRestrict network access to EPMM management interface to trusted IP addresses only
Enhanced Monitoring
allImplement strict monitoring for authentication failures and unusual access patterns to EPMM
🧯 If You Can't Patch
- Isolate EPMM system behind firewall with strict IP-based access controls
- Implement multi-factor authentication for all EPMM administrative access
🔍 How to Verify
Check if Vulnerable:
Check EPMM version in administration console or via SSH: grep -i version /path/to/epmm/installation
Check Version:
ssh admin@epmm-host 'cat /opt/airwatch/version.txt' or check in web admin interface
Verify Fix Applied:
Verify version is 12.1.0.1 or later in EPMM administration interface
📡 Detection & Monitoring
Log Indicators:
- Authentication bypass attempts
- Unusual successful logins without proper authentication flow
- Access to sensitive endpoints without prior auth logs
Network Indicators:
- Direct access to EPMM administrative endpoints without authentication handshake
- Unusual traffic patterns to EPMM management interface
SIEM Query:
source="epmm" AND (event_type="auth_failure" OR event_type="admin_access") | stats count by src_ip, user