CVE-2024-50330

9.8 CRITICAL

📋 TL;DR

This critical SQL injection vulnerability in Ivanti Endpoint Manager allows remote unauthenticated attackers to execute arbitrary SQL commands, potentially leading to remote code execution. All organizations running affected versions of Ivanti EPM are at risk, particularly those with internet-facing instances.

💻 Affected Systems

Products:
  • Ivanti Endpoint Manager
Versions: All versions before 2024 November Security Update or 2022 SU6 November Security Update
Operating Systems: Windows Server (primary deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining administrative control over the EPM server, lateral movement to connected endpoints, and data exfiltration.

🟠

Likely Case

Database compromise leading to credential theft, configuration manipulation, and installation of backdoors for persistent access.

🟢

If Mitigated

Limited impact with proper network segmentation and web application firewalls blocking SQL injection attempts.

🌐 Internet-Facing: HIGH - Remote unauthenticated exploitation makes internet-facing instances extremely vulnerable to automated attacks.
🏢 Internal Only: HIGH - Even internal instances are vulnerable to insider threats or compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are commonly weaponized quickly. The unauthenticated nature and high CVSS score make this attractive to attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024 November Security Update or 2022 SU6 November Security Update

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2024-for-EPM-2024-and-EPM-2022

Restart Required: Yes

Instructions:

1. Download the November 2024 security update from Ivanti portal. 2. Backup your EPM database and configuration. 3. Apply the update following Ivanti's installation guide. 4. Restart the EPM services and verify functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate EPM servers from internet access and restrict internal access to authorized networks only.

Web Application Firewall

all

Deploy WAF with SQL injection protection rules in front of EPM web interface.

🧯 If You Can't Patch

  • Immediately isolate the EPM server from all network access except absolutely required management connections.
  • Implement strict network monitoring and alerting for any SQL injection attempts against the EPM web interface.

🔍 How to Verify

Check if Vulnerable:

Check EPM version in Administration Console > About. If version is before November 2024 security update (for 2024) or 2022 SU6 November update, you are vulnerable.

Check Version:

Check via EPM web interface: Administration > About, or check Windows Programs and Features for Ivanti Endpoint Manager version.

Verify Fix Applied:

Verify version shows the November 2024 security update applied. Test web interface functionality remains intact.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts followed by successful access
  • Unexpected process creation from EPM service account

Network Indicators:

  • SQL injection patterns in HTTP requests to EPM web endpoints
  • Outbound connections from EPM server to unknown external IPs

SIEM Query:

source="epm_web_logs" AND (http_uri="*sql*" OR http_uri="*union*" OR http_uri="*select*" OR http_uri="*insert*")

🔗 References

📤 Share & Export