CVE-2024-50326

7.2 HIGH

📋 TL;DR

This SQL injection vulnerability in Ivanti Endpoint Manager allows authenticated administrators to execute arbitrary SQL commands, potentially leading to remote code execution. Organizations using Ivanti EPM versions before the November 2024 security updates are affected.

💻 Affected Systems

Products:
  • Ivanti Endpoint Manager
Versions: All versions before 2024 November Security Update or 2022 SU6 November Security Update
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin authentication to exploit

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative access to the underlying server, data exfiltration, and lateral movement within the network.

🟠

Likely Case

Database compromise leading to sensitive information disclosure, privilege escalation, and potential RCE on the EPM server.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege, and input validation controls are implemented.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

SQL injection vulnerabilities are typically easy to exploit once identified, but this requires admin credentials

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024 November Security Update or 2022 SU6 November Security Update

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2024-for-EPM-2024-and-EPM-2022

Restart Required: Yes

Instructions:

1. Download the November 2024 security update from Ivanti portal. 2. Apply the update following Ivanti's documentation. 3. Restart the EPM server and services.

🔧 Temporary Workarounds

Restrict Admin Access

all

Limit administrative access to only trusted users and implement multi-factor authentication

Network Segmentation

all

Isolate EPM server from critical systems and implement firewall rules

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries at application layer
  • Deploy web application firewall with SQL injection rules

🔍 How to Verify

Check if Vulnerable:

Check EPM version in Ivanti console: Settings > About

Check Version:

Check Ivanti EPM console or review installed updates in Windows Control Panel

Verify Fix Applied:

Verify version shows 2024 November Security Update or 2022 SU6 November Security Update applied

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts followed by admin access
  • Unexpected process execution on EPM server

Network Indicators:

  • Unusual outbound connections from EPM server
  • SQL query patterns in HTTP requests to EPM

SIEM Query:

source="epm_logs" AND (sql OR injection OR "exec sp_")

🔗 References

📤 Share & Export