CVE-2024-8322

4.3 MEDIUM

📋 TL;DR

This vulnerability allows remote authenticated attackers to bypass authentication controls in Ivanti Endpoint Manager (EPM) and access restricted functionality. It affects Ivanti EPM versions before 2022 SU6 and before the September 2024 update. Organizations using these vulnerable versions are at risk.

💻 Affected Systems

Products:
  • Ivanti Endpoint Manager (EPM)
Versions: All versions before 2022 SU6 and before September 2024 update
Operating Systems: Windows, Linux (EPM server platforms)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both EPM 2022 and EPM 2024 versions. Requires attacker to have some level of authentication (not necessarily admin).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could gain administrative privileges, modify system configurations, deploy malicious software, or exfiltrate sensitive data from managed endpoints.

🟠

Likely Case

Privilege escalation allowing authenticated users to access administrative functions they shouldn't have permission to use.

🟢

If Mitigated

Limited impact if strong network segmentation, least privilege access, and monitoring are in place to detect unauthorized access attempts.

🌐 Internet-Facing: MEDIUM - While authentication is required, exposed EPM interfaces could be targeted by attackers with stolen or compromised credentials.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts could exploit this to gain elevated privileges and move laterally within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but the vulnerability involves weak authentication mechanisms that could be relatively easy to bypass once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2022 SU6 or September 2024 update

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Ivanti's support portal. 2. Apply 2022 SU6 for EPM 2022 installations. 3. Apply September 2024 update for EPM 2024 installations. 4. Restart the EPM server and services. 5. Verify patch installation through the EPM console.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to EPM management interfaces to only authorized administrative networks

Enhanced Authentication Controls

all

Implement multi-factor authentication for all EPM administrative accounts

🧯 If You Can't Patch

  • Implement strict network access controls to limit EPM interface access to only necessary administrative IPs
  • Enable detailed audit logging for all authentication attempts and privilege escalation events in EPM

🔍 How to Verify

Check if Vulnerable:

Check EPM version in the console under Help > About. If version is earlier than 2022 SU6 for EPM 2022, or lacks September 2024 update for EPM 2024, the system is vulnerable.

Check Version:

In EPM console: Help > About displays current version

Verify Fix Applied:

Verify version shows 2022 SU6 or later for EPM 2022, or includes September 2024 update for EPM 2024. Test authentication controls for patch management functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication patterns
  • Access to patch management functions from non-admin accounts
  • Failed privilege escalation attempts followed by successful access

Network Indicators:

  • Unexpected connections to EPM patch management ports from non-admin workstations
  • Traffic patterns suggesting enumeration of EPM administrative interfaces

SIEM Query:

source="epm_logs" AND (event_type="authentication" OR event_type="authorization") AND result="success" AND user_role!="administrator" AND target_function="patch_management"

🔗 References

📤 Share & Export