Ivanti this week rolled out security patches to address multiple critical vulnerabilities in the Endpoint Manager (EPM). A remote attacker can exploit the flaws to gain code execution under certain conditions.<\/p>\n\n\n\n
Below is the list of the addressed vulnerabilities:<\/p>\n\n\n\n
CVE<\/strong><\/td> | Description<\/td> | CVSS<\/td> | Vector<\/td><\/tr> |
CVE-2024-29822<\/td> | An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code.<\/td> | 9.6<\/td> | CVSS:3.1\/AV:A\/AC:L\/PR:N\/UI:N\/S:C\/C:H\/I:H\/A:H<\/td><\/tr> |
CVE-2024-29823<\/td> | An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code.<\/td> | 9.6<\/td> | CVSS:3.1\/AV:A\/AC:L\/PR:N\/UI:N\/S:C\/C:H\/I:H\/A:H<\/td><\/tr> |
CVE-2024-29824<\/td> | An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code.<\/td> | 9.6<\/td> | CVSS:3.1\/AV:A\/AC:L\/PR:N\/UI:N\/S:C\/C:H\/I:H\/A:H<\/td><\/tr> |
CVE-2024-29825<\/td> | An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code.<\/td> | 9.6<\/td> | CVSS:3.1\/AV:A\/AC:L\/PR:N\/UI:N\/S:C\/C:H\/I:H\/A:H<\/td><\/tr> |
CVE-2024-29826<\/td> | An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code.<\/td> | 9.6<\/td> | CVSS:3.1\/AV:A\/AC:L\/PR:N\/UI:N\/S:C\/C:H\/I:H\/A:H<\/td><\/tr> |
CVE-2024-29827<\/td> | An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code.<\/td> | 9.6<\/td> | CVSS:3.1\/AV:A\/AC:L\/PR:N\/UI:N\/S:C\/C:H\/I:H\/A:H<\/td><\/tr> |
CVE-2024-29828<\/td> | An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an authenticated attacker within the same network to execute arbitrary code.<\/td> | 8.4<\/td> | CVSS:3.1\/AV:A\/AC:L\/PR:H\/UI:N\/S:C\/C:H\/I:H\/A:H <\/td><\/tr> |
CVE-2024-29829<\/td> | An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an authenticated attacker within the same network to execute arbitrary code.<\/td> | 8.4<\/td> | CVSS:3.1\/AV:A\/AC:L\/PR:H\/UI:N\/S:C\/C:H\/I:H\/A:H <\/td><\/tr> |
CVE-2024-29830<\/td> | An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an authenticated attacker within the same network to execute arbitrary code.<\/td> | 8.4<\/td> | CVSS:3.1\/AV:A\/AC:L\/PR:H\/UI:N\/S:C\/C:H\/I:H\/A:H <\/td><\/tr> |
CVE-2024-29846<\/td> | An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an authenticated attacker within the same network to execute arbitrary code.<\/td> | 8.4<\/td> | CVSS:3.1\/AV:A\/AC:L\/PR:H\/UI:N\/S:C\/C:H\/I:H\/A:H<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n The vulnerabilities impact 2022 SU5 and earlier versions.<\/p>\n\n\n\n Six out of 10 vulnerabilities (CVE-2024-29822, CVE-2024-29823, CVE-2024-29824, CVE-2024-29825, CVE-2024-29826, CVE-2024-29827) have been rated critical (CVSS score 9.6). The flaws are SQL injection issues, an unauthenticated attacker within the same network can exploit these vulnerabilities to execute arbitrary code.<\/p>\n\n\n\n The company is not aware of attacks in the wild exploiting these vulnerabilities.<\/p>\n\n\n\n “We are not aware of any customers being exploited by this vulnerability at the time of disclosure.” reads the advisory<\/a>.<\/em><\/p>\n\n\n\n Pierluigi Paganini<\/strong><\/a><\/p>\n\n\n\n Follow me on Twitter: @securityaffairs<\/strong><\/a> and Facebook<\/strong><\/a> and Mastodon<\/a><\/p>\n\n\n\n (<\/strong>SecurityAffairs<\/strong><\/a>\u00a0\u2013<\/strong>\u00a0hacking, Ivanti Endpoint Manager)<\/strong><\/p>\n\n\n\n |