CVE-2024-44103

8.8 HIGH

📋 TL;DR

This vulnerability allows a local authenticated attacker to perform DLL hijacking in Ivanti Workspace Control's management console, enabling privilege escalation. Attackers can execute arbitrary code with elevated privileges by placing malicious DLLs in specific locations. Organizations using Ivanti Workspace Control versions before 2025.2 are affected.

💻 Affected Systems

Products:
  • Ivanti Workspace Control
Versions: All versions before 2025.2 (10.19.0.0)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local authenticated access to the system running Ivanti Workspace Control management console.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise where attackers gain administrative privileges, install persistent backdoors, access sensitive data, and move laterally across the network.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, install additional malware, and access restricted system resources.

🟢

If Mitigated

Limited impact with proper access controls, application whitelisting, and least privilege principles in place.

🌐 Internet-Facing: LOW - This requires local authenticated access, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Local authenticated attackers can exploit this for privilege escalation within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

DLL hijacking is a well-known technique requiring local authenticated access and knowledge of vulnerable DLL loading paths.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2025.2 (10.19.0.0) or later

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Workspace-Control-IWC

Restart Required: Yes

Instructions:

1. Download Ivanti Workspace Control version 2025.2 or later from Ivanti portal. 2. Backup current configuration. 3. Run the installer with administrative privileges. 4. Restart the system. 5. Verify the update completed successfully.

🔧 Temporary Workarounds

Restrict DLL Loading Paths

windows

Configure Windows to restrict DLL loading from untrusted directories using DLL search order hardening.

Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager" -Name "SafeDllSearchMode" -Value 1
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager" -Name "CWDIllegalInDllSearch" -Value 0xffffffff

Application Whitelisting

windows

Implement application control policies to prevent execution of unauthorized DLLs.

# Configure Windows Defender Application Control or AppLocker policies

🧯 If You Can't Patch

  • Implement strict least privilege principles - ensure users don't have write permissions to directories in DLL search paths.
  • Monitor for suspicious DLL loading events and file creation in application directories using endpoint detection tools.

🔍 How to Verify

Check if Vulnerable:

Check Ivanti Workspace Control version in Control Panel > Programs and Features or run 'wmic product get name,version' and look for versions below 2025.2.

Check Version:

wmic product where "name like '%Ivanti Workspace Control%'" get name,version

Verify Fix Applied:

Verify installed version is 2025.2 (10.19.0.0) or higher using the same version check methods.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs: Security logs showing DLL loading from unusual paths
  • Application logs showing Ivanti Workspace Control loading DLLs from user-writable directories

Network Indicators:

  • Unusual outbound connections from Ivanti Workspace Control processes post-exploitation

SIEM Query:

source="windows" event_id=4688 process_name="*workspace*" OR process_name="*ivanti*" AND (dll_loaded="*temp*" OR dll_loaded="*users*")

🔗 References

📤 Share & Export