CVE-2024-50328

7.2 HIGH

📋 TL;DR

This SQL injection vulnerability in Ivanti Endpoint Manager allows authenticated administrators to execute arbitrary SQL commands, potentially leading to remote code execution. It affects Ivanti EPM versions before the November 2024 security update for 2024 versions or before the November 2024 security update for 2022 SU6. Only authenticated users with admin privileges can exploit this vulnerability.

💻 Affected Systems

Products:
  • Ivanti Endpoint Manager
Versions: All versions before November 2024 Security Update for EPM 2024, and all versions before November 2024 Security Update for EPM 2022 SU6
Operating Systems: Windows Server (EPM server components)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin authentication to exploit. EPM agents and managed endpoints are not directly vulnerable but could be compromised through the server.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with admin credentials achieves full system compromise through SQL injection leading to remote code execution, potentially gaining complete control over the EPM server and connected endpoints.

🟠

Likely Case

Privileged insider or compromised admin account uses SQL injection to execute arbitrary commands, potentially accessing sensitive data or modifying system configurations.

🟢

If Mitigated

With proper access controls, network segmentation, and admin credential protection, exploitation is limited to authorized administrators who should already have extensive system access.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires admin credentials and SQL injection knowledge. No public exploit code available as of knowledge cutoff.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: November 2024 Security Update for EPM 2024 or November 2024 Security Update for EPM 2022 SU6

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2024-for-EPM-2024-and-EPM-2022

Restart Required: Yes

Instructions:

1. Download the November 2024 security update from the Ivanti support portal. 2. Backup your EPM database and configuration. 3. Apply the update following Ivanti's installation guide. 4. Restart the EPM server services. 5. Verify successful installation through the EPM console.

🔧 Temporary Workarounds

Restrict Admin Access

all

Limit administrative access to only essential personnel and implement multi-factor authentication for all admin accounts.

Network Segmentation

all

Isolate EPM servers from internet access and restrict internal network access to only necessary management systems.

🧯 If You Can't Patch

  • Implement strict access controls and monitor all admin account activity
  • Deploy web application firewall with SQL injection protection rules

🔍 How to Verify

Check if Vulnerable:

Check EPM version in the console under Help > About. If version is before the November 2024 security update, the system is vulnerable.

Check Version:

In EPM console: Navigate to Help > About to view version information

Verify Fix Applied:

Verify the installed update appears in the EPM console under Updates/Patches section and version number reflects the November 2024 security update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL query patterns in EPM database logs
  • Multiple failed login attempts followed by successful admin login
  • Unexpected process execution from EPM server

Network Indicators:

  • Unusual database connections from EPM server
  • Suspicious outbound connections from EPM server

SIEM Query:

source="epm_logs" AND (sql_injection_terms OR "exec" OR "xp_cmdshell")

🔗 References

📤 Share & Export