CVE-2024-44107

8.8 HIGH

📋 TL;DR

This vulnerability allows local authenticated attackers to perform DLL hijacking in Ivanti Workspace Control's management console, enabling privilege escalation and arbitrary code execution. Organizations using Ivanti Workspace Control versions before 2025.2 (10.19.0.0) are affected.

💻 Affected Systems

Products:
  • Ivanti Workspace Control
Versions: All versions before 2025.2 (10.19.0.0)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local authenticated access to the management console component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative privileges, lateral movement across the network, and persistent backdoor installation.

🟠

Likely Case

Local privilege escalation allowing attackers to gain administrative rights on affected systems and execute malicious code.

🟢

If Mitigated

Limited impact with proper access controls, application whitelisting, and DLL path restrictions in place.

🌐 Internet-Facing: LOW - Requires local authenticated access, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Exploitable by authenticated users on internal networks, enabling privilege escalation attacks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

DLL hijacking vulnerabilities are commonly exploited and require only local authenticated access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2025.2 (10.19.0.0) or later

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Workspace-Control-IWC

Restart Required: Yes

Instructions:

1. Download Ivanti Workspace Control version 2025.2 or later from the Ivanti portal. 2. Run the installer with administrative privileges. 3. Follow the upgrade wizard. 4. Restart affected systems.

🔧 Temporary Workarounds

Restrict DLL Loading Paths

windows

Configure Windows to restrict DLL loading to trusted directories only

Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager" -Name "SafeDllSearchMode" -Value 1
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager" -Name "CWDIllegalInDllSearch" -Value 1

Application Whitelisting

windows

Implement application control policies to prevent unauthorized DLL execution

Configure Windows Defender Application Control or AppLocker policies

🧯 If You Can't Patch

  • Implement strict access controls to limit who can access the Ivanti Workspace Control management console
  • Monitor for suspicious DLL loading events and file creation in application directories

🔍 How to Verify

Check if Vulnerable:

Check Ivanti Workspace Control version in Control Panel > Programs and Features or run 'wmic product get name,version'

Check Version:

wmic product where "name like '%Ivanti Workspace Control%'" get version

Verify Fix Applied:

Verify version is 2025.2 (10.19.0.0) or later and test management console functionality

📡 Detection & Monitoring

Log Indicators:

  • DLL loading from unusual locations
  • Process creation by Ivanti Workspace Control management console from non-standard paths
  • Privilege escalation events

Network Indicators:

  • Unusual outbound connections from Ivanti Workspace Control processes

SIEM Query:

EventID=4688 AND ProcessName LIKE '%IWC%' AND ParentProcessName LIKE '%explorer%' AND CommandLine LIKE '%.dll%'

🔗 References

📤 Share & Export