Remote Code Execution Vulnerability in Ivanti EPM Agent Portal

CVE-2024-29847
9.8CRITICAL

Key Information

Vendor
Ivanti
Status
Epm
Vendor
CVE Published:
12 September 2024

Badges

πŸ”₯ No. 1 TrendingπŸ˜„ TrendedπŸ‘Ύ Exploit ExistsπŸ”΄ Public PoCπŸ“° News Worthy

Summary

The vulnerability (CVE-2024-29847) affects the agent portal of Ivanti Endpoint Manager, allowing remote unauthenticated attackers to achieve remote code execution. Ivanti has released updates to fix this vulnerability, as well as 15 additional vulnerabilities, including critical SQL injection flaws and an external XML Entity (XXE) vulnerability. While none of these vulnerabilities are currently being exploited, it is crucial for admins to upgrade their installations quickly to mitigate the potential risk. The company has also increased its efforts to improve product security and has pledged to intensify its internal scanning, manual exploitation, and testing capabilities. These updates reflect Ivanti taking security more seriously following a series of zero-day vulnerabilities in its solutions being exploited by attackers.

Affected Version(s)

EPM < 2024 September Security Update

EPM < 2022 SU6

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • πŸ”₯

    Vulnerability reached the number 1 worldwide trending spot.

  • Vulnerability started trending.

  • πŸ‘Ύ

    Exploit exists.

  • Risk change from: null to: 10 - (CRITICAL)

  • Vulnerability published.

  • First article discovered by Help Net Security

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre Database2 Proof of Concept(s)3 News Article(s)
.