Ivanti Addressed Multiple Vulnerabilities as part of November 2024 advisories

Ivanti Addressed Multiple Vulnerabilities as part of November 2024 advisories


Ivanti has released trove of security updates  as part of November 2024 security advisory

Ivanti Endpoint Manager

The most critical vulnerability, CVE-2024-50330 with a CVSS score of 9.8, is a SQL injection flaw that could allow a remote unauthenticated attacker to achieve RCE.

CVE-2024-50323, CVE-2024-34787, CVE-2024-50322  all has a CVSS score of 7.8 that could allow a local unauthenticated attacker to achieve code execution.

CVE-2024-50329 with a CVSS score of 8.8 that could allow a remote unauthenticated attacker to achieve RCE.

Advertisements

SQL injection vulnerabilities that are tracked as CVE-2024-32839, CVE-2024-32841, CVE-2024-32844, CVE-2024-32847, CVE-2024-34780, CVE-2024-37376, CVE-2024-34781, CVE-2024-34782, CVE-2024-34784, CVE-2024-50324, CVE-2024-50326, CVE-2024-50327, CVE-2024-50328. All has a CVSS score of 7.2, that could allow a remote authenticated attacker with admin privileges to achieve RCE.

These vulnerabilities have been  addressed in the November Security Update for both the 2024 and 2022 SU6 versions of Endpoint Manager. Customers are strongly advised to update their products to the latest versions as soon as possible to mitigate the risk of potential attacks. No active exploitation is noted.

Connect Secure, Policy Secure, and Secure Access Client products

The most critical vulnerabilities, CVE-2024-38655, CVE-2024-38656, CVE-2024-39710, CVE-2024-39711, CVE-2024-39712, CVE-2024-11007, CVE-2024-11006, and CVE-2024-11005 all tracked with a score of CVSS 9.1, are critical argument injection and command injection flaws that could allow a remote authenticated attacker with admin privileges to achieve RCE.

CVE-2024-9420, CVE-2024-47906 all with a CVSS score of 8.8, A use-after-free vulnerability that could allow a remote authenticated attacker to achieve RCE, and excessive binary privileges that could allow a local authenticated attacker to escalate privileges.

Advertisements

CVE-2024-11004 all with a CVSS score of 8.4, Reflected cross-site scripting vulnerability that could allow a remote unauthenticated attacker to obtain admin privileges.

CVE-2024-39709 with a CVSS score of 7.8, Incorrect file permissions that could allow a local authenticated attacker to escalate privileges.

CVE-2024-37398, CVE-2024-7571  all with a CVSS score of7.8, Insufficient validation and incorrect permissions that could allow a local authenticated attacker to escalate privileges.

CVE-2024-37400, CVE-2024-47907, CVE-2024-8495, CVE-2024-38649 all with a CVSS score of 7.5, Out-of-bounds read, null pointer dereferences, and out-of-bounds write vulnerabilities that could allow a remote unauthenticated attacker to trigger an infinite loop or cause a DoS.

CVE-2024-9842 with a CVSS score of 7.3, Incorrect permissions that could allow a local authenticated attacker to create arbitrary folders.

Advertisements

CVE-2024-8539, CVE-2024-29211 all with a CVSS score 7.1, Improper authorization and a race condition that could allow a local authenticated attacker to modify sensitive configuration files.

CVE-2024-9843 with a CVSS score of  5.0, A buffer over-read vulnerability that could allow a local unauthenticated attacker to cause a DoS.

CVE-2024-47905, CVE-2024-47909 all with a CVSS score of 4.9, Stack-based buffer overflow vulnerabilities that could allow a remote authenticated attacker with admin privileges to cause a denial of service.

CVE-2024-38654 all with a CVSS score of 4.4, Improper bounds checking that could allow a local authenticated attacker with admin privileges to cause a DoS.

Advertisements

Ivanti has addressed these vulnerabilities in the following versions:

  • Ivanti Connect Secure 22.7R2.3
  • Ivanti Policy Secure 22.7R1.2
  • Ivanti Secure Access Client 22.7R4

Customers are strongly advised to update their products to the latest versions as soon as possible to mitigate the risk of potential attacks. For more details refer to the  advisory.

Comments

No comments yet. Why don’t you start the discussion?

    Leave a Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.