CVE-2024-50323

7.8 HIGH

📋 TL;DR

This CVE describes a SQL injection vulnerability in Ivanti Endpoint Manager that allows a local unauthenticated attacker to execute arbitrary code. User interaction is required for exploitation. Organizations using Ivanti Endpoint Manager versions before the November 2024 security updates are affected.

💻 Affected Systems

Products:
  • Ivanti Endpoint Manager
Versions: All versions before 2024 November Security Update or 2022 SU6 November Security Update
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access and user interaction for exploitation

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise leading to data exfiltration, lateral movement, and persistent backdoor installation

🟠

Likely Case

Local privilege escalation leading to administrative control over the endpoint management system

🟢

If Mitigated

Limited impact due to network segmentation and proper access controls preventing lateral movement

🌐 Internet-Facing: LOW with brief explanation
🏢 Internal Only: HIGH with brief explanation

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities typically have low exploitation complexity once the injection point is identified

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024 November Security Update or 2022 SU6 November Security Update

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2024-for-EPM-2024-and-EPM-2022

Restart Required: Yes

Instructions:

1. Download the November 2024 security update from Ivanti portal. 2. Apply the update following Ivanti's deployment guide. 3. Restart affected systems as required.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Ivanti Endpoint Manager servers to only authorized administrative systems

Input Validation Enhancement

all

Implement additional input validation at web application firewall or reverse proxy layer

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Ivanti Endpoint Manager from critical systems
  • Enable detailed SQL query logging and monitor for suspicious database activity patterns

🔍 How to Verify

Check if Vulnerable:

Check Ivanti Endpoint Manager version against affected versions in the security advisory

Check Version:

Check Ivanti Endpoint Manager console or use vendor-specific version query commands

Verify Fix Applied:

Verify installation of November 2024 security updates through Ivanti console or version check

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL query patterns
  • Multiple failed authentication attempts followed by SQL errors
  • Unexpected database schema modifications

Network Indicators:

  • Unusual database connection patterns from non-administrative systems
  • SQL error messages in HTTP responses

SIEM Query:

source="ivanti_epm" AND (sql_error OR sql_injection OR "unexpected query")

🔗 References

📤 Share & Export