CVE-2024-9845

7.8 HIGH

📋 TL;DR

This vulnerability allows a local authenticated attacker to escalate privileges on systems running vulnerable versions of Ivanti Automation. Attackers with standard user access can gain higher privileges through insecure permissions. Organizations using Ivanti Automation before version 2024.4.0.1 are affected.

💻 Affected Systems

Products:
  • Ivanti Automation
Versions: All versions before 2024.4.0.1
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local authenticated access to the system running Ivanti Automation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where an attacker gains administrative/root privileges, potentially leading to data theft, lateral movement, or persistence establishment.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, install malware, or access restricted data and systems.

🟢

If Mitigated

Limited impact if proper access controls, least privilege principles, and network segmentation are implemented.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring authenticated access to the system.
🏢 Internal Only: HIGH - Internal users with standard access could exploit this to gain elevated privileges on affected systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local authenticated access but the vulnerability involves insecure permissions which typically have low exploitation complexity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.4.0.1

Vendor Advisory: https://forums.ivanti.com/s/article/December-2024-Security-Advisory-Ivanti-Automation-CVE-2024-9845

Restart Required: Yes

Instructions:

1. Download Ivanti Automation version 2024.4.0.1 or later from the Ivanti portal. 2. Backup current configuration and data. 3. Install the update following Ivanti's upgrade documentation. 4. Restart the Ivanti Automation services and verify functionality.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit local access to Ivanti Automation systems to only authorized administrators.

Implement Least Privilege

all

Ensure all users operate with minimum necessary privileges and cannot execute unauthorized privileged operations.

🧯 If You Can't Patch

  • Implement strict access controls and monitor for privilege escalation attempts
  • Isolate affected systems from critical network segments and implement additional monitoring

🔍 How to Verify

Check if Vulnerable:

Check Ivanti Automation version in administration console or via 'ivanti-automation --version' command.

Check Version:

ivanti-automation --version

Verify Fix Applied:

Verify version is 2024.4.0.1 or later and test that standard users cannot perform privileged operations.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • Unauthorized access to privileged directories or files
  • Suspicious process creation with elevated privileges

Network Indicators:

  • Unusual outbound connections from Ivanti Automation systems
  • Lateral movement attempts from previously low-privilege accounts

SIEM Query:

source="ivanti-automation" AND (event_type="privilege_escalation" OR user_elevation="true")

🔗 References

📤 Share & Export