Researchers have developed a proof-of-concept (PoC) exploit for a critical vulnerability in Ivanti Endpoint Manager, identified as CVE-2024-29824. This SQL injection flaw allows unauthenticated attackers to perform remote code execution (RCE) and has been rated with a severe CVSS score of 9.8 out of 10. The vulnerability, which affects Ivanti’s centralized endpoint management solution, could potentially enable mass exploitation across devices within an organization.
The flaw was initially discovered by an independent researcher and was sold to Trend Micro’s Zero Day Initiative (ZDI) in April 2024. ZDI promptly informed Ivanti about the issue, and Ivanti has since released a patch to address the vulnerability. The PoC, published by Horizon3.ai on GitHub, demonstrates how attackers can exploit the flaw by sending a simple request to execute Windows Notepad through the Endpoint Manager.
Ivanti’s response to the vulnerability has been notably swift compared to their handling of past issues. Despite a challenging year with multiple zero-day vulnerabilities and slow patching, Ivanti managed to release a fix for CVE-2024-29824 within six weeks of being informed. This timely response is seen as a positive development amid their recent security troubles.
Organizations using Ivanti Endpoint Manager are advised to implement the patch immediately and take additional measures to secure their management interfaces. Restricting access to trusted IP addresses can further protect the system from potential exploitation, given the increased risk posed by the availability of the PoC.
Reference: