CyberWatch

Critical RCE Vulnerability Patched in Ivanti Standalone Sentry

By

By

Access Point Consulting

Summary

Ivanti’s internal security team discovered a Critical Remote Code Execution (RCE) vulnerability in one of their products in late 2023. This vulnerability, known as CVE-2024-41724 (CVSS: 9.6) allows an unauthenticated attacker to execute arbitrary commands on the operating system of the appliance within the same physical or logical network.

Impact Assessment

This vulnerability impacts all supported versions of Ivanti Sentry and version 2024.4.0 of Ivanti Neurons for ITSM (Cloud) and versions R87 and R95 of Ivanti Neurons for MDM (Cloud). If exploited, this vulnerability would have a high impact on confidentiality, integrity, and availability due to the attacker's ability to execute arbitrary operating system commands. This can present a myriad of different possibilities for the attacker, including potentially allowing a backdoor into a system.

Remediation

According to Ivanti, customers can access the patch for Ivanti Sentry via the standard download portal using a login. Versions 9.17.1, 9.18.1, 9.19.1 or later of Ivanti Sentry will remediate this vulnerability.

Business Implications

Due to the nature of this vulnerability which allows an attacker to impact a machine in many ways after its exploitation, business implications can be severe. Depending on which user or machine is impacted, exploitation could have serious monetary, data, and reputational impacts.

Access Point Consulting Recommends

Patch: We recommend patching Ivanti Sentry as soon as possible through the Ivanti standard download portal. This is the best way to mitigate the vulnerability.

Harden network: According to Ivanti, the only way to exploit this vulnerability over the internet is for the threat actor to have a valid TLS client certificate enrolled through PMM / N-MDM. Providing protections through policy or security system rules will reduce the chance of this vulnerability from being exploited.

Associated Bulletins

https://forums.ivanti.com/s/article/KB-CVE-2023-41724-Remote-Code-Execution-for-Ivanti-Standalone-Sentry?language=en_US

https://forums.ivanti.com/s/article/CVE-2023-41724-Remote-Code-Execution-for-Ivanti-Standalone-Sentry?language=en_US

 

Resources

Latest Resources

Resources

CyberWatch

April 2, 2025

Scott "Monty" Montgomery (Island) | Navigating CMMC compliance for organizations of every size

Scott Montgomery, known as Monty, joined the CyberWatch Expert Series podcast to discuss his extensive background in cybersecurity, particularly in building and designing network security tools for high-assurance environments like the Department of Defense (DoD) and the intelligence community. His experience includes significant tenure at McAfee (now Trellix), which led him to his current role at Island, where he focuses on innovative approaches to cybersecurity compliance.

Find out more
March 19, 2025

Michael Sviben (DomainGuard) | Defending against phishing and building proactive security awareness

Cybersecurity threats evolve rapidly, and one tactic consistently rises above the rest: phishing. In this episode of CyberWatch, Michael Sviben, co-founder of DomainGuard, discusses why phishing remains so effective, how businesses and individuals become targets, and what you can do to stay vigilant.

Find out more
March 5, 2025

David Habib (Brightspot) | Building a culture of cybersecurity awareness

Cybersecurity awareness is often reduced to check-the-box training, but David Habib, CIO at Brightspot, argues that real security awareness isn’t about formal programs—it’s about making security part of a company’s culture. In this episode, he shares practical insights on how organizations can move beyond stale training sessions to create an engaged and security-conscious workforce.

Find out more