CVE-2024-7572

7.1 HIGH

📋 TL;DR

This vulnerability in Ivanti DSM allows local authenticated users to delete arbitrary files due to insufficient permissions. It affects organizations using Ivanti DSM versions before 2024.3.5740. Attackers with local access can exploit this to disrupt operations or delete critical system files.

💻 Affected Systems

Products:
  • Ivanti Desktop and Server Management (DSM)
Versions: All versions before 2024.3.5740
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all default installations of Ivanti DSM before the patched version. Requires local authenticated access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could delete critical system files, configuration files, or application data, causing system instability, data loss, or complete system failure.

🟠

Likely Case

Malicious insiders or compromised accounts could delete important files to disrupt operations, cover tracks after other attacks, or cause targeted damage.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to non-critical files and can be quickly detected and contained.

🌐 Internet-Facing: LOW - This requires local authenticated access, so internet-facing systems are not directly vulnerable unless attackers first gain local access.
🏢 Internal Only: HIGH - Internal users with local access can exploit this, making it a significant insider threat risk.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local authenticated access but is technically simple once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.3.5740

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Desktop-and-Server-Management-DSM-CVE-2024-7572

Restart Required: Yes

Instructions:

1. Download Ivanti DSM version 2024.3.5740 or later from the Ivanti portal. 2. Backup current configuration and data. 3. Install the update following Ivanti's upgrade documentation. 4. Restart the DSM server and verify functionality.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit local access to DSM servers to only necessary administrative users

Implement File Integrity Monitoring

all

Monitor critical directories for unauthorized file deletions

🧯 If You Can't Patch

  • Implement strict access controls to limit who can log into DSM servers locally
  • Deploy file integrity monitoring on critical system directories and DSM installation paths

🔍 How to Verify

Check if Vulnerable:

Check the Ivanti DSM version in the administration console or via the DSM server interface. If version is below 2024.3.5740, the system is vulnerable.

Check Version:

On DSM server: Check Help > About in the DSM console or review the installation directory version files.

Verify Fix Applied:

After patching, verify the version shows 2024.3.5740 or higher in the DSM administration console.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected file deletion events in system logs
  • Failed file access attempts from non-admin users
  • DSM service errors related to missing files

Network Indicators:

  • Unusual authentication patterns to DSM servers
  • Multiple failed file access attempts from single sources

SIEM Query:

EventID:4663 OR EventID:4656 (Windows file deletion events) from DSM servers OR 'file delete' AND 'dsm' in application logs

🔗 References

📤 Share & Export