Remote Code Execution Vulnerability in Ivanti EPM Agent Portal
CVE-2024-29847
Key Information
- Vendor
- Ivanti
- Status
- Epm
- Vendor
- CVE Published:
- 12 September 2024
Badges
What is CVE-2024-29847?
CVE-2024-29847 is a serious remote code execution vulnerability affecting the Ivanti Endpoint Manager (EPM) Agent Portal, specifically in versions prior to the 2022 SU6 and the September 2024 update. This vulnerability arises from the deserialization of untrusted data, permitting a remote unauthenticated attacker to execute arbitrary code on the affected system. Such a breach could have catastrophic consequences for organizations utilizing Ivanti EPM for endpoint management, potentially compromising sensitive data and system integrity.
Technical Details
The vulnerability centers on how the Ivanti EPM Agent Portal processes serialized data. Versions preceding the specified updates are susceptible to exploitation via malicious input data, which can lead to unauthorized code execution without needing prior authentication. Attackers can leverage this weakness to execute commands on the server, gain access to the system, and manipulate it in various harmful ways.
Impact of the Vulnerability
-
Remote Code Execution: The primary impact of CVE-2024-29847 is the potential for remote code execution, which allows attackers to run arbitrary code on vulnerable systems, giving them extensive control over affected environments.
-
Data Breach Risk: Exploitation of this vulnerability could lead to significant data breaches, as attackers may gain access to sensitive organizational data and user information, leading to data theft or data leakage.
-
System Integrity Compromise: With remote code execution capabilities, attackers can alter system configurations, install malicious software, or engage in further cybercriminal activities, jeopardizing the integrity of the entire network where Ivanti EPM is deployed.
Affected Version(s)
EPM < 2024 September Security Update
EPM < 2022 SU6
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
News Articles
October Patch Tuesday: MSFT patches 2 exploited zero days
Microsoft has patched a brace of zero days that are under active attack as part of October Patch Tuesday 2024.
2 months ago
Exploit code released for critical Ivanti RCE flaw, patch now
A proof-of-concept (PoC) exploit for CVE-2024-29847, a critical remote code execution (RCE) vulnerability in Ivanti Endpoint Manager, is now publicly released, making it crucial to update devices.
3 months ago
Newly patched Ivanti CSA flaw under active exploitation
The Cloud Service Appliance command injection vulnerability β patched as part of the final update for end-of-life CSA version 4.6 β has been attacked in the wild, Ivanti confirms.
3 months ago
Refferences
EPSS Score
1% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- π₯
Vulnerability reached the number 1 worldwide trending spot
- π΄
Public PoC available
Vulnerability started trending
Vulnerability published
- πΎ
Exploit known to exist
First article discovered by Help Net Security
Vulnerability Reserved