CyberWatch

Critical Vulnerability Present in Ivanti EPM

By

By

Access Point Consulting

Summary

A vulnerability is present in Ivanti EndPoint Manager version 2021/2022 prior to SU5. This vulnerability is classified as CVE-2023-39336 and was given a critical CVSS score of 9.6. If exploited, an attacker with access to the internal network can leverage an unspecified SQL injection to execute arbitrary SQL queries and retrieve output without the need for authentication. This can potentially allow for an attacker to control all machines running an agent from the end point manager. If the core server is configured to use Microsoft SQL Express, this could lead to remote-code execution on the core server.

Impact Assessment

This vulnerability has a critically high CVSS score of 9.6 because it allows a network-adjacent attacker to potentially gain control of EndPoint Manager-controlled machines without requiring authentication. It can also result in remote code execution if the core server is configured to use SQL express.

Affected Applications

Ivanti Endpoint Manager 2021/2022 prior to SU5

What it means for you

If you use Ivanti Endpoint Manager, update it to version SU5. If not, prepare appropriate procedures for patching.

Remediation

Update Ivanti Endpoint Manager to version SU5

Business Implications

Exploitation of this vulnerability would be devastating, as all Ivanti endpoint managed devices would be affected and controlled by the attacker as a result. Expect monetary and reputational loss.

Access Point Technology Recommends

Update: Update Ivanti Endpoint Manager as soon as possible. Ivanti products are reportedly targeted for exploitation by threat actors on a regular basis.

Associated Bulletins

https://forums.ivanti.com/s/article/SA-2023-12-19-CVE-2023-39336?language=en_US

Resources

Trending Articles & Security Reports

Resources

CyberWatch

September 19, 2024

Stealing the Show: From Competitor to Threat Actor

In December 2020, Ticketmaster was hit with a $10 million fine for an act of corporate espionage. The company had engaged in unauthorized access to a competitor's computer systems, using stolen login credentials to gather confidential business intelligence. Although this scandal broke nearly four years ago, it serves as a reminder of the legal and ethical responsibilities businesses must adhere to in today’s marketplace.

Find out more
September 18, 2024

Adobe Patched Potential Zero-Day in Reader

Adobe released a patch for a suspected zero-day vulnerability in Adobe Reader, identified as CVE-2024-41869. This vulnerability, a Use After Free (UAF) issue, can lead to arbitrary code execution, system crashes, or the return of unexpected values.

Find out more
September 16, 2024

Why We Need NIST's Post-Quantum Cryptography Standards

Last month, NIST published its first set of post-quantum cryptography (PQC) standards, setting a new benchmark for enterprises, government agencies, and vendors to withstand future cyberattacks from quantum computers. The time to start transitioning is now. Discover what’s at stake with CyberWatch.

Find out more