Article Details
Scrape Timestamp (UTC): 2024-10-03 06:07:31.488
Source: https://thehackernews.com/2024/10/ivanti-endpoint-manager-flaw-actively.html
Original Article Text
Click to Toggle View
Ivanti Endpoint Manager Flaw Actively Targeted, CISA Warns Agencies to Patch. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a security flaw impacting Endpoint Manager (EPM) that the company patched in May to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability, tracked as CVE-2024-29824, carries a CVSS score of 9.6 out of a maximum of 10.0, indicating critical severity. "An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code," the software service provider said in an advisory released on May 21, 2024. Horizon3.ai, which released a proof-of-concept (PoC) exploit for the flaw in June, said the issue is rooted in a function called RecordGoodApp() within a DLL named PatchBiz.dll. Specifically, it concerns how the function handles an SQL query statement, thereby allowing an attacker to gain remote code execution via xp_cmdshell. The exact specifics of how the shortcoming is being exploited in the wild remains unclear, but Ivanti has since updated the bulletin to state that it has "confirmed exploitation of CVE-2024-29824" and that a "limited number of customers" have been targeted. With the latest development, as many as four different flaws in Ivanti appliances have come under active abuse within just a month's span, showing that they are a lucrative attack vector for threat actors - Federal agencies are mandated to update their instances to the latest version by October 23, 2024, to safeguard their networks against active threats.
Daily Brief Summary
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a severe flaw in Ivanti Endpoint Manager to its Known Exploited Vulnerabilities catalog.
The vulnerability, identified as CVE-2024-29824, has a critical severity rating of 9.6 and allows unauthenticated code execution.
Ivanti had initially patched this SQL Injection vulnerability in May 2024, which affects all versions up to 2022 SU5.
A proof-of-concept exploit was publicly released by Horizon3.ai in June 2024, detailing the exploit mechanisms.
The vulnerability exploits a function in PatchBiz.dll that improperly handles SQL queries, enabling attackers to execute remote commands.
There have been confirmed cases of active exploitation among a limited number of Ivanti customers.
Federal agencies are required to update their Ivanti EPM systems by October 23, 2024, to defend against this and other recently exploited vulnerabilities in Ivanti products.