CVE-2024-7569

9.6 CRITICAL

📋 TL;DR

An unauthenticated attacker can obtain OIDC client secrets from debug information in Ivanti ITSM on-prem and Neurons for ITSM. This allows potential authentication bypass and further system compromise. Affects versions 2023.4 and earlier.

💻 Affected Systems

Products:
  • Ivanti ITSM on-prem
  • Ivanti Neurons for ITSM
Versions: 2023.4 and earlier
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with debug information enabled or accessible via specific endpoints.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker obtains OIDC client secret, uses it to impersonate legitimate users, gains administrative access, and compromises the entire ITSM system and connected infrastructure.

🟠

Likely Case

Attacker obtains client secret and uses it to access sensitive ITSM data, modify configurations, or escalate privileges within the system.

🟢

If Mitigated

Limited to information disclosure only if OIDC integration is disabled or properly segmented, but still exposes sensitive configuration data.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires accessing specific debug endpoints that expose sensitive information.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2023.5 or later

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Neurons-for-ITSM-CVE-2024-7569-CVE-2024-7570

Restart Required: Yes

Instructions:

1. Download and install Ivanti ITSM/Neurons for ITSM version 2023.5 or later. 2. Apply the patch according to Ivanti's documentation. 3. Restart the ITSM services. 4. Verify the fix by checking version and testing debug endpoints.

🔧 Temporary Workarounds

Disable Debug Endpoints

all

Restrict access to debug information endpoints in the ITSM configuration.

Configure application settings to disable debug mode
Restrict network access to debug endpoints via firewall rules

Network Segmentation

all

Isolate ITSM systems from untrusted networks and implement strict access controls.

Configure firewall rules to limit ITSM access to trusted IPs only
Implement network segmentation between ITSM and user networks

🧯 If You Can't Patch

  • Immediately restrict network access to ITSM systems using firewall rules and allow only trusted IP addresses.
  • Disable OIDC integration if not required, or rotate OIDC client secrets and monitor for unauthorized usage.

🔍 How to Verify

Check if Vulnerable:

Check if ITSM version is 2023.4 or earlier and test if debug endpoints expose OIDC client secrets.

Check Version:

Check ITSM administration console or configuration files for version information.

Verify Fix Applied:

Verify installation of version 2023.5 or later and confirm debug endpoints no longer expose sensitive information.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access to debug endpoints
  • Unusual authentication attempts using OIDC
  • Multiple failed access attempts to sensitive endpoints

Network Indicators:

  • Unusual traffic patterns to ITSM debug endpoints
  • External IPs accessing internal ITSM systems

SIEM Query:

source="itsm_logs" AND (url="*debug*" OR url="*oidc*" OR status=401) AND src_ip NOT IN trusted_ips

🔗 References

📤 Share & Export