CVE-2024-36132

7.5 HIGH

📋 TL;DR

This authentication bypass vulnerability in Ivanti EPMM allows remote attackers to access sensitive resources without proper credentials. It affects Ivanti Endpoint Manager for Mobile (EPMM) versions prior to 12.1.0.1. Organizations using vulnerable EPMM deployments are at risk of unauthorized access to mobile management systems.

💻 Affected Systems

Products:
  • Ivanti Endpoint Manager for Mobile (EPMM)
Versions: All versions prior to 12.1.0.1
Operating Systems: All platforms running EPMM
Default Config Vulnerable: ⚠️ Yes
Notes: All EPMM deployments with affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the EPMM system allowing attacker to manage all enrolled mobile devices, deploy malicious configurations, access sensitive corporate data, and pivot to internal networks.

🟠

Likely Case

Unauthorized access to administrative functions, exposure of sensitive mobile device management data, and potential credential harvesting from the EPMM platform.

🟢

If Mitigated

Limited impact with proper network segmentation, strong authentication controls, and monitoring in place, though authentication bypass still presents significant risk.

🌐 Internet-Facing: HIGH - EPMM systems are often internet-facing for mobile device management, making them directly accessible to attackers.
🏢 Internal Only: MEDIUM - Internal attackers or those who have breached perimeter could exploit this to escalate privileges within the mobile management infrastructure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows unauthenticated access, suggesting relatively simple exploitation once the specific bypass method is understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 12.1.0.1

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-for-Mobile-EPMM-July-2024

Restart Required: Yes

Instructions:

1. Download EPMM version 12.1.0.1 from Ivanti support portal. 2. Backup current EPMM configuration and database. 3. Apply the update following Ivanti's upgrade documentation. 4. Restart EPMM services. 5. Verify successful update and functionality.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to EPMM management interface to trusted IP addresses only

Enhanced Monitoring

all

Implement strict monitoring for authentication failures and unusual access patterns to EPMM

🧯 If You Can't Patch

  • Isolate EPMM system behind firewall with strict IP-based access controls
  • Implement multi-factor authentication for all EPMM administrative access

🔍 How to Verify

Check if Vulnerable:

Check EPMM version in administration console or via SSH: grep -i version /path/to/epmm/installation

Check Version:

ssh admin@epmm-host 'cat /opt/airwatch/version.txt' or check in web admin interface

Verify Fix Applied:

Verify version is 12.1.0.1 or later in EPMM administration interface

📡 Detection & Monitoring

Log Indicators:

  • Authentication bypass attempts
  • Unusual successful logins without proper authentication flow
  • Access to sensitive endpoints without prior auth logs

Network Indicators:

  • Direct access to EPMM administrative endpoints without authentication handshake
  • Unusual traffic patterns to EPMM management interface

SIEM Query:

source="epmm" AND (event_type="auth_failure" OR event_type="admin_access") | stats count by src_ip, user

🔗 References

📤 Share & Export