Vulnerabilites related to ivanti - endpoint_manager
cve-2020-13772
Vulnerability from cvelistv5
Published
2020-11-16 15:24
Modified
2024-08-04 12:25
Severity ?
EPSS score ?
Summary
In /ldclient/ldprov.cgi in Ivanti Endpoint Manager through 2020.1.1, an attacker is able to disclose information about the server operating system, local pathnames, and environment variables with no authentication required.
References
▼ | URL | Tags |
---|---|---|
https://forums.ivanti.com/s/ | x_refsource_MISC | |
https://labs.jumpsec.com/cve-2020-13772-ivanti-uem-system-information-disclosure/ | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T12:25:16.481Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://forums.ivanti.com/s/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://labs.jumpsec.com/cve-2020-13772-ivanti-uem-system-information-disclosure/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "In /ldclient/ldprov.cgi in Ivanti Endpoint Manager through 2020.1.1, an attacker is able to disclose information about the server operating system, local pathnames, and environment variables with no authentication required.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-11-16T15:24:46", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://forums.ivanti.com/s/", }, { tags: [ "x_refsource_MISC", ], url: "https://labs.jumpsec.com/cve-2020-13772-ivanti-uem-system-information-disclosure/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2020-13772", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In /ldclient/ldprov.cgi in Ivanti Endpoint Manager through 2020.1.1, an attacker is able to disclose information about the server operating system, local pathnames, and environment variables with no authentication required.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://forums.ivanti.com/s/", refsource: "MISC", url: "https://forums.ivanti.com/s/", }, { name: "https://labs.jumpsec.com/cve-2020-13772-ivanti-uem-system-information-disclosure/", refsource: "MISC", url: "https://labs.jumpsec.com/cve-2020-13772-ivanti-uem-system-information-disclosure/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2020-13772", datePublished: "2020-11-16T15:24:46", dateReserved: "2020-06-02T00:00:00", dateUpdated: "2024-08-04T12:25:16.481Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-13160
Vulnerability from cvelistv5
Published
2025-01-14 17:12
Modified
2025-03-10 22:20
Severity ?
EPSS score ?
Summary
Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Ivanti | Endpoint Manager |
Patch: 2024 January-2025 Security Update Patch: 2022 SU6 January-2025 Security Update |
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-13160", options: [ { Exploitation: "active", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-03-10T17:12:11.208884Z", version: "2.0.3", }, type: "ssvc", }, }, { other: { content: { dateAdded: "2025-03-10", reference: "https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json", }, type: "kev", }, }, ], providerMetadata: { dateUpdated: "2025-03-10T22:20:23.152Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, references: [ { tags: [ "exploit", ], url: "https://www.horizon3.ai/attack-research/attack-blogs/ivanti-endpoint-manager-multiple-credential-coercion-vulnerabilities/", }, ], timeline: [ { lang: "en", time: "2025-03-10T00:00:00+00:00", value: "CVE-2024-13160 added to CISA KEV", }, ], title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "affected", product: "Endpoint Manager", vendor: "Ivanti", versions: [ { status: "unaffected", version: "2024 January-2025 Security Update", versionType: "custom", }, { status: "unaffected", version: "2022 SU6 January-2025 Security Update", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<span style=\"background-color: rgb(255, 255, 255);\">Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.</span><span style=\"background-color: rgb(255, 255, 255);\"> </span>", }, ], value: "Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.", }, ], impacts: [ { capecId: "CAPEC-597", descriptions: [ { lang: "en", value: "CAPEC-597 Absolute Path Traversal", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-36", description: "CWE-36 Absolute Path Traversal", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-14T17:12:23.237Z", orgId: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", shortName: "ivanti", }, references: [ { url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", assignerShortName: "ivanti", cveId: "CVE-2024-13160", datePublished: "2025-01-14T17:12:23.237Z", dateReserved: "2025-01-07T02:28:25.356Z", dateUpdated: "2025-03-10T22:20:23.152Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-13769
Vulnerability from cvelistv5
Published
2020-11-16 15:28
Modified
2024-08-04 12:25
Severity ?
EPSS score ?
Summary
LDMS/alert_log.aspx in Ivanti Endpoint Manager through 2020.1 allows SQL Injection via a /remotecontrolauth/api/device request.
References
▼ | URL | Tags |
---|---|---|
https://forums.ivanti.com/s/ | x_refsource_MISC | |
https://labs.jumpsec.com/advisory-cve-2020-13769-ivanti-uem-sql-injection/ | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T12:25:16.504Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://forums.ivanti.com/s/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://labs.jumpsec.com/advisory-cve-2020-13769-ivanti-uem-sql-injection/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "LDMS/alert_log.aspx in Ivanti Endpoint Manager through 2020.1 allows SQL Injection via a /remotecontrolauth/api/device request.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-11-16T15:28:05", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://forums.ivanti.com/s/", }, { tags: [ "x_refsource_MISC", ], url: "https://labs.jumpsec.com/advisory-cve-2020-13769-ivanti-uem-sql-injection/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2020-13769", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "LDMS/alert_log.aspx in Ivanti Endpoint Manager through 2020.1 allows SQL Injection via a /remotecontrolauth/api/device request.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://forums.ivanti.com/s/", refsource: "MISC", url: "https://forums.ivanti.com/s/", }, { name: "https://labs.jumpsec.com/advisory-cve-2020-13769-ivanti-uem-sql-injection/", refsource: "MISC", url: "https://labs.jumpsec.com/advisory-cve-2020-13769-ivanti-uem-sql-injection/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2020-13769", datePublished: "2020-11-16T15:28:05", dateReserved: "2020-06-02T00:00:00", dateUpdated: "2024-08-04T12:25:16.504Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-29828
Vulnerability from cvelistv5
Published
2024-05-31 17:38
Modified
2024-08-02 01:17
Severity ?
EPSS score ?
Summary
An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an authenticated attacker within the same network to execute arbitrary code.
References
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "endpoint_manager", vendor: "ivanti", versions: [ { lessThanOrEqual: "2022 SU5", status: "affected", version: "0", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-29828", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-06-03T16:41:47.794157Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-07-30T14:30:18.659Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-02T01:17:57.504Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "EPM", vendor: "Ivanti", versions: [ { lessThanOrEqual: "2022 SU5", status: "affected", version: "2022 SU5", versionType: "semver", }, ], }, ], descriptions: [ { lang: "en", value: "An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an authenticated attacker within the same network to execute arbitrary code.", }, ], metrics: [ { cvssV3_0: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, }, ], providerMetadata: { dateUpdated: "2024-05-31T17:38:31.394Z", orgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", shortName: "hackerone", }, references: [ { url: "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", }, ], }, }, cveMetadata: { assignerOrgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", assignerShortName: "hackerone", cveId: "CVE-2024-29828", datePublished: "2024-05-31T17:38:31.394Z", dateReserved: "2024-03-20T01:04:06.690Z", dateUpdated: "2024-08-02T01:17:57.504Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-29829
Vulnerability from cvelistv5
Published
2024-05-31 17:38
Modified
2024-08-02 01:17
Severity ?
EPSS score ?
Summary
An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an authenticated attacker within the same network to execute arbitrary code.
References
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "endpoint_manager", vendor: "ivanti", versions: [ { lessThanOrEqual: "2022 SU5", status: "affected", version: "0", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-29829", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-06-03T16:45:18.267656Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-06-04T17:57:37.638Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-02T01:17:58.030Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "EPM", vendor: "Ivanti", versions: [ { lessThanOrEqual: "2022 SU5", status: "affected", version: "2022 SU5", versionType: "semver", }, ], }, ], descriptions: [ { lang: "en", value: "An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an authenticated attacker within the same network to execute arbitrary code.", }, ], metrics: [ { cvssV3_0: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, }, ], providerMetadata: { dateUpdated: "2024-05-31T17:38:31.379Z", orgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", shortName: "hackerone", }, references: [ { url: "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", }, ], }, }, cveMetadata: { assignerOrgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", assignerShortName: "hackerone", cveId: "CVE-2024-29829", datePublished: "2024-05-31T17:38:31.379Z", dateReserved: "2024-03-20T01:04:06.690Z", dateUpdated: "2024-08-02T01:17:58.030Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-8321
Vulnerability from cvelistv5
Published
2024-09-10 20:54
Modified
2024-09-11 15:20
Severity ?
EPSS score ?
Summary
Missing authentication in Network Isolation of Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote unauthenticated attacker to isolate managed devices from the network.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Ivanti | Endpoint Manager |
Patch: 2022 SU6 Patch: 2024 September Security Update |
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", ], defaultStatus: "affected", product: "endpoint_manager", vendor: "ivanti", versions: [ { lessThan: "2022_su6", status: "unaffected", version: "0", versionType: "custom", }, { lessThan: "2024_september_security_update", status: "unaffected", version: "2024", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-8321", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-09-11T14:15:05.575432Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-11T15:20:28.646Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "affected", product: "Endpoint Manager", vendor: "Ivanti", versions: [ { status: "unaffected", version: "2022 SU6", versionType: "custom", }, { status: "unaffected", version: "2024 September Security Update", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<span style=\"background-color: rgb(255, 255, 255);\">Missing authentication in Network Isolation of Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote unauthenticated attacker to isolate managed devices from the network.</span><span style=\"background-color: rgb(255, 255, 255);\"> </span>", }, ], value: "Missing authentication in Network Isolation of Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote unauthenticated attacker to isolate managed devices from the network.", }, ], impacts: [ { capecId: "CAPEC-180", descriptions: [ { lang: "en", value: "CAPEC-180 Exploiting Incorrectly Configured Access Control Security Levels", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-306", description: "CWE-306 Missing Authentication for Critical Function", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-09-10T20:54:02.772Z", orgId: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", shortName: "ivanti", }, references: [ { url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", assignerShortName: "ivanti", cveId: "CVE-2024-8321", datePublished: "2024-09-10T20:54:02.772Z", dateReserved: "2024-08-29T19:19:19.784Z", dateUpdated: "2024-09-11T15:20:28.646Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-50323
Vulnerability from cvelistv5
Published
2024-11-12 15:37
Modified
2024-11-19 04:56
Severity ?
EPSS score ?
Summary
SQL injection in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a local unauthenticated attacker to achieve code execution. User interaction is required.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Ivanti | Endpoint Manager |
Patch: 2024 November Security Update Patch: 2022 SU6 November Security Update |
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", ], defaultStatus: "unaffected", product: "endpoint_manager", vendor: "ivanti", versions: [ { status: "affected", version: "2024_november_security_update", }, { status: "affected", version: "2022_su6_november_security_update", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-50323", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-18T00:00:00+00:00", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-19T04:56:06.281Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "affected", product: "Endpoint Manager", vendor: "Ivanti", versions: [ { status: "unaffected", version: "2024 November Security Update", versionType: "custom", }, { status: "unaffected", version: "2022 SU6 November Security Update", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<span style=\"background-color: rgb(255, 255, 255);\">SQL injection in Ivanti Endpoint Manager before </span><span style=\"background-color: rgb(255, 255, 255);\">2024 November Security Update or 2022 SU6 November Security Update</span><span style=\"background-color: rgb(255, 255, 255);\"> allows a local unauthenticated attacker to achieve code execution. User interaction is required.</span><span style=\"background-color: rgb(255, 255, 255);\"> </span>", }, ], value: "SQL injection in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a local unauthenticated attacker to achieve code execution. User interaction is required.", }, ], impacts: [ { capecId: "CAPEC-66", descriptions: [ { lang: "en", value: "CAPEC-66 SQL Injection", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-11-12T15:37:08.015Z", orgId: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", shortName: "ivanti", }, references: [ { url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2024-for-EPM-2024-and-EPM-2022", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", assignerShortName: "ivanti", cveId: "CVE-2024-50323", datePublished: "2024-11-12T15:37:08.015Z", dateReserved: "2024-10-22T16:41:33.250Z", dateUpdated: "2024-11-19T04:56:06.281Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-32840
Vulnerability from cvelistv5
Published
2024-09-12 01:09
Modified
2024-09-12 21:20
Severity ?
EPSS score ?
Summary
An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.
References
Impacted products
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", ], defaultStatus: "affected", product: "endpoint_manager", vendor: "ivanti", versions: [ { lessThan: "2022_su6", status: "unaffected", version: "0", versionType: "custom", }, { lessThan: "2024_september_security_update", status: "unaffected", version: "2024", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-32840", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-09-12T03:55:11.560582Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-09-12T21:20:02.605Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "EPM", vendor: "Ivanti", versions: [ { lessThan: "2024 September Security Update", status: "affected", version: "2024 September Security Update", versionType: "custom", }, { lessThan: "2022 SU6", status: "affected", version: "2022 SU6", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.", }, ], metrics: [ { cvssV3_0: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, }, ], providerMetadata: { dateUpdated: "2024-09-12T01:09:56.338Z", orgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", shortName: "hackerone", }, references: [ { url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022", }, ], }, }, cveMetadata: { assignerOrgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", assignerShortName: "hackerone", cveId: "CVE-2024-32840", datePublished: "2024-09-12T01:09:56.338Z", dateReserved: "2024-04-19T01:04:06.773Z", dateUpdated: "2024-09-12T21:20:02.605Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-29846
Vulnerability from cvelistv5
Published
2024-05-31 17:38
Modified
2024-08-02 01:17
Severity ?
EPSS score ?
Summary
An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an authenticated attacker within the same network to execute arbitrary code.
References
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "endpoint_manager", vendor: "ivanti", versions: [ { lessThanOrEqual: "2022 SU5", status: "affected", version: "0", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-29846", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-06-03T16:46:33.712149Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-06-04T17:57:19.104Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-02T01:17:58.190Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.ivanti.com/blog/topics/security-advisory", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "EPM", vendor: "Ivanti", versions: [ { lessThanOrEqual: "2022 SU5", status: "affected", version: "2022 SU5", versionType: "semver", }, ], }, ], descriptions: [ { lang: "en", value: "An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an authenticated attacker within the same network to execute arbitrary code.", }, ], metrics: [ { cvssV3_0: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, }, ], providerMetadata: { dateUpdated: "2024-05-31T17:38:31.371Z", orgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", shortName: "hackerone", }, references: [ { url: "https://www.ivanti.com/blog/topics/security-advisory", }, ], }, }, cveMetadata: { assignerOrgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", assignerShortName: "hackerone", cveId: "CVE-2024-29846", datePublished: "2024-05-31T17:38:31.371Z", dateReserved: "2024-03-21T01:04:07.088Z", dateUpdated: "2024-08-02T01:17:58.190Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-29827
Vulnerability from cvelistv5
Published
2024-05-31 17:38
Modified
2024-08-02 01:17
Severity ?
EPSS score ?
Summary
An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code.
References
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "endpoint_manager", vendor: "ivanti", versions: [ { lessThanOrEqual: "2022SU5", status: "affected", version: "0", versionType: "semver", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-29827", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-05-31T20:11:29.623980Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-06-04T17:57:13.815Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-02T01:17:57.542Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "EPM", vendor: "Ivanti", versions: [ { lessThanOrEqual: "2022 SU5", status: "affected", version: "2022 SU5", versionType: "semver", }, ], }, ], descriptions: [ { lang: "en", value: "An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code. ", }, ], metrics: [ { cvssV3_0: { baseScore: 9.6, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, }, ], providerMetadata: { dateUpdated: "2024-05-31T17:38:31.405Z", orgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", shortName: "hackerone", }, references: [ { url: "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", }, ], }, }, cveMetadata: { assignerOrgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", assignerShortName: "hackerone", cveId: "CVE-2024-29827", datePublished: "2024-05-31T17:38:31.405Z", dateReserved: "2024-03-20T01:04:06.690Z", dateUpdated: "2024-08-02T01:17:57.542Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-50328
Vulnerability from cvelistv5
Published
2024-11-12 15:41
Modified
2024-11-19 04:55
Severity ?
EPSS score ?
Summary
SQL injection in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a remote authenticated attacker with admin privileges to achieve remote code execution.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Ivanti | Endpoint Manager |
Patch: 2024 November Security Update Patch: 2022 SU6 November Security Update |
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", ], defaultStatus: "unaffected", product: "endpoint_manager", vendor: "ivanti", versions: [ { status: "affected", version: "2024_november_security_update", }, { status: "affected", version: "2022_su6_november_security_update", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-50328", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-18T00:00:00+00:00", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-19T04:55:58.542Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "affected", product: "Endpoint Manager", vendor: "Ivanti", versions: [ { status: "unaffected", version: "2024 November Security Update", versionType: "custom", }, { status: "unaffected", version: "2022 SU6 November Security Update", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<span style=\"background-color: rgb(255, 255, 255);\">SQL injection in Ivanti Endpoint Manager before </span><span style=\"background-color: rgb(255, 255, 255);\">2024 November Security Update or 2022 SU6 November Security Update</span><span style=\"background-color: rgb(255, 255, 255);\"> allows a remote authenticated attacker with admin privileges to achieve remote code execution.</span><span style=\"background-color: rgb(255, 255, 255);\"> </span>", }, ], value: "SQL injection in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a remote authenticated attacker with admin privileges to achieve remote code execution.", }, ], impacts: [ { capecId: "CAPEC-66", descriptions: [ { lang: "en", value: "CAPEC-66 SQL Injection", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-11-12T15:41:17.871Z", orgId: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", shortName: "ivanti", }, references: [ { url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2024-for-EPM-2024-and-EPM-2022", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", assignerShortName: "ivanti", cveId: "CVE-2024-50328", datePublished: "2024-11-12T15:41:17.871Z", dateReserved: "2024-10-22T16:41:33.251Z", dateUpdated: "2024-11-19T04:55:58.542Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-50327
Vulnerability from cvelistv5
Published
2024-11-12 15:40
Modified
2024-11-19 04:55
Severity ?
EPSS score ?
Summary
SQL injection in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a remote authenticated attacker with admin privileges to achieve remote code execution.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Ivanti | Endpoint Manager |
Patch: 2024 November Security Update Patch: 2022 SU6 November Security Update |
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", ], defaultStatus: "unaffected", product: "endpoint_manager", vendor: "ivanti", versions: [ { status: "affected", version: "2024_november_security_update", }, { status: "affected", version: "2022_su6_november_security_update", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-50327", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-18T00:00:00+00:00", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-19T04:55:54.842Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "affected", product: "Endpoint Manager", vendor: "Ivanti", versions: [ { status: "unaffected", version: "2024 November Security Update", versionType: "custom", }, { status: "unaffected", version: "2022 SU6 November Security Update", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<span style=\"background-color: rgb(255, 255, 255);\">SQL injection in Ivanti Endpoint Manager before </span><span style=\"background-color: rgb(255, 255, 255);\">2024 November Security Update or 2022 SU6 November Security Update</span><span style=\"background-color: rgb(255, 255, 255);\"> allows a remote authenticated attacker with admin privileges to achieve remote code execution.</span><span style=\"background-color: rgb(255, 255, 255);\"> </span>", }, ], value: "SQL injection in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a remote authenticated attacker with admin privileges to achieve remote code execution.", }, ], impacts: [ { capecId: "CAPEC-66", descriptions: [ { lang: "en", value: "CAPEC-66 SQL Injection", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-11-12T15:40:38.609Z", orgId: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", shortName: "ivanti", }, references: [ { url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2024-for-EPM-2024-and-EPM-2022", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", assignerShortName: "ivanti", cveId: "CVE-2024-50327", datePublished: "2024-11-12T15:40:38.609Z", dateReserved: "2024-10-22T16:41:33.251Z", dateUpdated: "2024-11-19T04:55:54.842Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-29826
Vulnerability from cvelistv5
Published
2024-05-31 17:38
Modified
2024-08-02 01:17
Severity ?
EPSS score ?
Summary
An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code.
References
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "endpoint_manager", vendor: "ivanti", versions: [ { lessThanOrEqual: "2022 SU5", status: "affected", version: "0", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-29826", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-06-03T16:43:55.519776Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-06-04T17:57:27.047Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-02T01:17:58.045Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "EPM", vendor: "Ivanti", versions: [ { lessThanOrEqual: "2022 SU5", status: "affected", version: "2022 SU5", versionType: "semver", }, ], }, ], descriptions: [ { lang: "en", value: "An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code.", }, ], metrics: [ { cvssV3_0: { baseScore: 9.6, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, }, ], providerMetadata: { dateUpdated: "2024-05-31T17:38:31.399Z", orgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", shortName: "hackerone", }, references: [ { url: "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", }, ], }, }, cveMetadata: { assignerOrgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", assignerShortName: "hackerone", cveId: "CVE-2024-29826", datePublished: "2024-05-31T17:38:31.399Z", dateReserved: "2024-03-20T01:04:06.690Z", dateUpdated: "2024-08-02T01:17:58.045Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-27773
Vulnerability from cvelistv5
Published
2022-12-05 00:00
Modified
2024-08-03 05:32
Severity ?
EPSS score ?
Summary
A privilege escalation vulnerability is identified in Ivanti EPM (LANDesk Management Suite) that allows a user to execute commands with elevated privileges.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Ivanti Endpoint Manger |
Version: Fixed version: 2021.1 SU3 or above, on 2022 SU2 or above |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T05:32:59.990Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-for-Ivanti-Endpoint-Manager-Client-CVE-2022-27773?language=en_US", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Ivanti Endpoint Manger", vendor: "n/a", versions: [ { status: "affected", version: "Fixed version: 2021.1 SU3 or above, on 2022 SU2 or above", }, ], }, ], descriptions: [ { lang: "en", value: "A privilege escalation vulnerability is identified in Ivanti EPM (LANDesk Management Suite) that allows a user to execute commands with elevated privileges.", }, ], problemTypes: [ { descriptions: [ { description: "Privilege Escalation (CAPEC-233)", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-12-05T00:00:00", orgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", shortName: "hackerone", }, references: [ { url: "https://forums.ivanti.com/s/article/Security-Advisory-for-Ivanti-Endpoint-Manager-Client-CVE-2022-27773?language=en_US", }, ], }, }, cveMetadata: { assignerOrgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", assignerShortName: "hackerone", cveId: "CVE-2022-27773", datePublished: "2022-12-05T00:00:00", dateReserved: "2022-03-23T00:00:00", dateUpdated: "2024-08-03T05:32:59.990Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-13774
Vulnerability from cvelistv5
Published
2020-11-12 19:22
Modified
2024-08-04 12:25
Severity ?
EPSS score ?
Summary
An unrestricted file-upload issue in EditLaunchPadDialog.aspx in Ivanti Endpoint Manager 2019.1 and 2020.1 allows an authenticated attacker to gain remote code execution by uploading a malicious aspx file. The issue is caused by insufficient file extension validation and insecure file operations on the uploaded image, which upon failure will leave the temporarily created files in an accessible location on the server.
References
▼ | URL | Tags |
---|---|---|
https://labs.jumpsec.com/advisory-cve-2020-13774-ivanti-uem-rce/ | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T12:25:16.517Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://labs.jumpsec.com/advisory-cve-2020-13774-ivanti-uem-rce/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "An unrestricted file-upload issue in EditLaunchPadDialog.aspx in Ivanti Endpoint Manager 2019.1 and 2020.1 allows an authenticated attacker to gain remote code execution by uploading a malicious aspx file. The issue is caused by insufficient file extension validation and insecure file operations on the uploaded image, which upon failure will leave the temporarily created files in an accessible location on the server.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-11-12T19:22:15", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://labs.jumpsec.com/advisory-cve-2020-13774-ivanti-uem-rce/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2020-13774", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An unrestricted file-upload issue in EditLaunchPadDialog.aspx in Ivanti Endpoint Manager 2019.1 and 2020.1 allows an authenticated attacker to gain remote code execution by uploading a malicious aspx file. The issue is caused by insufficient file extension validation and insecure file operations on the uploaded image, which upon failure will leave the temporarily created files in an accessible location on the server.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://labs.jumpsec.com/advisory-cve-2020-13774-ivanti-uem-rce/", refsource: "MISC", url: "https://labs.jumpsec.com/advisory-cve-2020-13774-ivanti-uem-rce/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2020-13774", datePublished: "2020-11-12T19:22:15", dateReserved: "2020-06-02T00:00:00", dateUpdated: "2024-08-04T12:25:16.517Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-38343
Vulnerability from cvelistv5
Published
2023-09-21 00:00
Modified
2024-09-24 16:59
Severity ?
EPSS score ?
Summary
An XXE (XML external entity injection) vulnerability exists in the CSEP component of Ivanti Endpoint Manager before 2022 SU4. External entity references are enabled in the XML parser configuration. Exploitation of this vulnerability can lead to file disclosure or Server Side Request Forgery.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T17:39:12.818Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.ivanti.com/releases", }, { tags: [ "x_transferred", ], url: "https://gist.github.com/bhyahoo/4772330b20057a271f77e690bc70f928", }, ], title: "CVE Program Container", }, { affected: [ { cpes: [ "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "endpoint_manager", vendor: "ivanti", versions: [ { status: "affected", version: "2022_su4", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2023-38343", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-09-24T16:57:06.534838Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-24T16:59:33.767Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "An XXE (XML external entity injection) vulnerability exists in the CSEP component of Ivanti Endpoint Manager before 2022 SU4. External entity references are enabled in the XML parser configuration. Exploitation of this vulnerability can lead to file disclosure or Server Side Request Forgery.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-09-21T20:57:44.212704", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://www.ivanti.com/releases", }, { url: "https://gist.github.com/bhyahoo/4772330b20057a271f77e690bc70f928", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2023-38343", datePublished: "2023-09-21T00:00:00", dateReserved: "2023-07-15T00:00:00", dateUpdated: "2024-09-24T16:59:33.767Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-38344
Vulnerability from cvelistv5
Published
2023-09-21 00:00
Modified
2024-09-24 16:55
Severity ?
EPSS score ?
Summary
An issue was discovered in Ivanti Endpoint Manager before 2022 SU4. A file disclosure vulnerability exists in the GetFileContents SOAP action exposed via /landesk/managementsuite/core/core.secure/OsdScript.asmx. The application does not sufficiently restrict user-supplied paths, allowing for an authenticated attacker to read arbitrary files from a remote system, including the private key used to authenticate to agents for remote access.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T17:39:12.204Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.ivanti.com/releases", }, { tags: [ "x_transferred", ], url: "https://gist.github.com/bhyahoo/76533e91840200a1d9f3fb1eb87eb0f1", }, ], title: "CVE Program Container", }, { affected: [ { cpes: [ "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "endpoint_manager", vendor: "ivanti", versions: [ { lessThan: "2022_SU4", status: "affected", version: "0", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2023-38344", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-09-24T16:50:37.739306Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-200", description: "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-09-24T16:55:31.523Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "An issue was discovered in Ivanti Endpoint Manager before 2022 SU4. A file disclosure vulnerability exists in the GetFileContents SOAP action exposed via /landesk/managementsuite/core/core.secure/OsdScript.asmx. The application does not sufficiently restrict user-supplied paths, allowing for an authenticated attacker to read arbitrary files from a remote system, including the private key used to authenticate to agents for remote access.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-09-21T21:00:04.415196", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://www.ivanti.com/releases", }, { url: "https://gist.github.com/bhyahoo/76533e91840200a1d9f3fb1eb87eb0f1", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2023-38344", datePublished: "2023-09-21T00:00:00", dateReserved: "2023-07-15T00:00:00", dateUpdated: "2024-09-24T16:55:31.523Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-28323
Vulnerability from cvelistv5
Published
2023-06-30 23:40
Modified
2024-08-02 12:38
Severity ?
EPSS score ?
Summary
A deserialization of untrusted data exists in EPM 2022 Su3 and all prior versions that allows an unauthenticated user to elevate rights. This exploit could potentially be used in conjunction with other OS (Operating System) vulnerabilities to escalate privileges on the machine or be used as a stepping stone to get to other network attached machines.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Ivanti | Ivanti Endpoint Manager |
Version: 2022 ≤ |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T12:38:24.901Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://forums.ivanti.com/s/article/SA-2023-06-20-CVE-2023-28323", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Ivanti Endpoint Manager", vendor: "Ivanti", versions: [ { lessThan: "2022", status: "affected", version: "2022", versionType: "semver", }, ], }, ], descriptions: [ { lang: "en", value: "A deserialization of untrusted data exists in EPM 2022 Su3 and all prior versions that allows an unauthenticated user to elevate rights. This exploit could potentially be used in conjunction with other OS (Operating System) vulnerabilities to escalate privileges on the machine or be used as a stepping stone to get to other network attached machines.\r\n", }, ], providerMetadata: { dateUpdated: "2023-06-30T23:40:30.788Z", orgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", shortName: "hackerone", }, references: [ { url: "https://forums.ivanti.com/s/article/SA-2023-06-20-CVE-2023-28323", }, ], }, }, cveMetadata: { assignerOrgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", assignerShortName: "hackerone", cveId: "CVE-2023-28323", datePublished: "2023-06-30T23:40:30.788Z", dateReserved: "2023-03-14T01:00:13.190Z", dateUpdated: "2024-08-02T12:38:24.901Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-8320
Vulnerability from cvelistv5
Published
2024-09-10 20:52
Modified
2024-09-11 15:19
Severity ?
EPSS score ?
Summary
Missing authentication in Network Isolation of Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote unauthenticated attacker to spoof Network Isolation status of managed devices.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Ivanti | Endpoint Manager |
Patch: 2022 SU6 Patch: 2024 September Security Update |
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:ivanti:automation:*:*:*:*:*:*:*:*", ], defaultStatus: "affected", product: "automation", vendor: "ivanti", versions: [ { lessThan: "2022_su6", status: "unaffected", version: "0", versionType: "custom", }, { lessThan: "2024_september_security_update", status: "unaffected", version: "2024", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-8320", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-09-11T14:31:35.357495Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-11T15:19:03.245Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "affected", product: "Endpoint Manager", vendor: "Ivanti", versions: [ { status: "unaffected", version: "2022 SU6", versionType: "custom", }, { status: "unaffected", version: "2024 September Security Update", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<span style=\"background-color: rgb(255, 255, 255);\">Missing authentication in Network Isolation of Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote unauthenticated attacker to spoof Network Isolation status of managed devices.</span><span style=\"background-color: rgb(255, 255, 255);\"> </span>", }, ], value: "Missing authentication in Network Isolation of Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote unauthenticated attacker to spoof Network Isolation status of managed devices.", }, ], impacts: [ { capecId: "CAPEC-148", descriptions: [ { lang: "en", value: "CAPEC-148 Content Spoofing", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-306", description: "CWE-306 Missing Authentication for Critical Function", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-09-10T20:52:31.146Z", orgId: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", shortName: "ivanti", }, references: [ { url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", assignerShortName: "ivanti", cveId: "CVE-2024-8320", datePublished: "2024-09-10T20:52:31.146Z", dateReserved: "2024-08-29T19:19:18.232Z", dateUpdated: "2024-09-11T15:19:03.245Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-29847
Vulnerability from cvelistv5
Published
2024-09-12 01:09
Modified
2024-09-17 03:55
Severity ?
EPSS score ?
Summary
Deserialization of untrusted data in the agent portal of Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote unauthenticated attacker to achieve remote code execution.
References
Impacted products
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", ], defaultStatus: "affected", product: "endpoint_manager", vendor: "ivanti", versions: [ { lessThan: "2022_su6", status: "unaffected", version: "0", versionType: "custom", }, { lessThan: "2024_september_security_update", status: "unaffected", version: "2024", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-29847", options: [ { Exploitation: "poc", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-09-11T00:00:00+00:00", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-502", description: "CWE-502 Deserialization of Untrusted Data", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-09-17T03:55:12.223Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "EPM", vendor: "Ivanti", versions: [ { lessThan: "2024 September Security Update", status: "affected", version: "2024 September Security Update", versionType: "custom", }, { lessThan: "2022 SU6", status: "affected", version: "2022 SU6", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "Deserialization of untrusted data in the agent portal of Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote unauthenticated attacker to achieve remote code execution.", }, ], metrics: [ { cvssV3_0: { baseScore: 10, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, }, ], providerMetadata: { dateUpdated: "2024-09-12T01:09:56.277Z", orgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", shortName: "hackerone", }, references: [ { url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022", }, ], }, }, cveMetadata: { assignerOrgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", assignerShortName: "hackerone", cveId: "CVE-2024-29847", datePublished: "2024-09-12T01:09:56.277Z", dateReserved: "2024-03-21T01:04:07.089Z", dateUpdated: "2024-09-17T03:55:12.223Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-13771
Vulnerability from cvelistv5
Published
2020-11-12 17:13
Modified
2024-08-04 12:25
Severity ?
EPSS score ?
Summary
Various components in Ivanti Endpoint Manager through 2020.1.1 rely on Windows search order when loading a (nonexistent) library file, allowing (under certain conditions) one to gain code execution (and elevation of privileges to the level of privilege held by the vulnerable component such as NT AUTHORITY\SYSTEM) via DLL hijacking. This affects ldiscn32.exe, IpmiRedirectionService.exe, LDAPWhoAmI.exe, and ldprofile.exe.
References
▼ | URL | Tags |
---|---|---|
https://labs.jumpsec.com/advisory-cve-2020-13771-ivanti-uem-dll-hijacking/ | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T12:25:16.676Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://labs.jumpsec.com/advisory-cve-2020-13771-ivanti-uem-dll-hijacking/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Various components in Ivanti Endpoint Manager through 2020.1.1 rely on Windows search order when loading a (nonexistent) library file, allowing (under certain conditions) one to gain code execution (and elevation of privileges to the level of privilege held by the vulnerable component such as NT AUTHORITY\\SYSTEM) via DLL hijacking. This affects ldiscn32.exe, IpmiRedirectionService.exe, LDAPWhoAmI.exe, and ldprofile.exe.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-11-12T17:13:04", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://labs.jumpsec.com/advisory-cve-2020-13771-ivanti-uem-dll-hijacking/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2020-13771", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Various components in Ivanti Endpoint Manager through 2020.1.1 rely on Windows search order when loading a (nonexistent) library file, allowing (under certain conditions) one to gain code execution (and elevation of privileges to the level of privilege held by the vulnerable component such as NT AUTHORITY\\SYSTEM) via DLL hijacking. This affects ldiscn32.exe, IpmiRedirectionService.exe, LDAPWhoAmI.exe, and ldprofile.exe.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://labs.jumpsec.com/advisory-cve-2020-13771-ivanti-uem-dll-hijacking/", refsource: "MISC", url: "https://labs.jumpsec.com/advisory-cve-2020-13771-ivanti-uem-dll-hijacking/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2020-13771", datePublished: "2020-11-12T17:13:04", dateReserved: "2020-06-02T00:00:00", dateUpdated: "2024-08-04T12:25:16.676Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-34779
Vulnerability from cvelistv5
Published
2024-09-12 01:09
Modified
2024-09-12 21:18
Severity ?
EPSS score ?
Summary
An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.
References
Impacted products
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", ], defaultStatus: "affected", product: "endpoint_manager", vendor: "ivanti", versions: [ { lessThan: "2022_su6", status: "unaffected", version: "0", versionType: "custom", }, { lessThan: "2024_september_security_update", status: "unaffected", version: "2024", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-34779", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-09-12T03:55:19.711193Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-09-12T21:18:18.550Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "EPM", vendor: "Ivanti", versions: [ { lessThan: "2024 September Security Update", status: "affected", version: "2024 September Security Update", versionType: "custom", }, { lessThan: "2022 SU6", status: "affected", version: "2022 SU6", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.", }, ], metrics: [ { cvssV3_0: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, }, ], providerMetadata: { dateUpdated: "2024-09-12T01:09:56.258Z", orgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", shortName: "hackerone", }, references: [ { url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022", }, ], }, }, cveMetadata: { assignerOrgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", assignerShortName: "hackerone", cveId: "CVE-2024-34779", datePublished: "2024-09-12T01:09:56.258Z", dateReserved: "2024-05-09T01:04:06.434Z", dateUpdated: "2024-09-12T21:18:18.550Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-50324
Vulnerability from cvelistv5
Published
2024-11-12 15:37
Modified
2024-11-19 04:56
Severity ?
EPSS score ?
Summary
Path traversal in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a remote authenticated attacker with admin privileges to achieve remote code execution.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Ivanti | Endpoint Manager |
Patch: 2024 November Security Update Patch: 2022 SU6 November Security Update |
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", ], defaultStatus: "unaffected", product: "endpoint_manager", vendor: "ivanti", versions: [ { status: "affected", version: "2024_november_security_update", }, { status: "affected", version: "2022_su6_november_security_update", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-50324", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-18T00:00:00+00:00", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-19T04:56:07.498Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "affected", product: "Endpoint Manager", vendor: "Ivanti", versions: [ { status: "unaffected", version: "2024 November Security Update", versionType: "custom", }, { status: "unaffected", version: "2022 SU6 November Security Update", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<span style=\"background-color: rgb(255, 255, 255);\">Path traversal in Ivanti Endpoint Manager before </span><span style=\"background-color: rgb(255, 255, 255);\">2024 November Security Update or 2022 SU6 November Security Update</span><span style=\"background-color: rgb(255, 255, 255);\"> allows a remote authenticated attacker with admin privileges to achieve remote code execution.</span><span style=\"background-color: rgb(255, 255, 255);\"> </span>", }, ], value: "Path traversal in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a remote authenticated attacker with admin privileges to achieve remote code execution.", }, ], impacts: [ { capecId: "CAPEC-110", descriptions: [ { lang: "en", value: "CAPEC-110 SQL Injection through SOAP Parameter Tampering", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-22", description: "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-11-12T15:37:52.162Z", orgId: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", shortName: "ivanti", }, references: [ { url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2024-for-EPM-2024-and-EPM-2022", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", assignerShortName: "ivanti", cveId: "CVE-2024-50324", datePublished: "2024-11-12T15:37:52.162Z", dateReserved: "2024-10-22T16:41:33.250Z", dateUpdated: "2024-11-19T04:56:07.498Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-35077
Vulnerability from cvelistv5
Published
2023-07-21 20:51
Modified
2024-10-24 15:55
Severity ?
EPSS score ?
Summary
An out-of-bounds write vulnerability on windows operating systems causes the Ivanti AntiVirus Product to crash. Update to Ivanti AV Product version 7.9.1.285 or above.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Ivanti | Endpoint Manager |
Version: 7.9.1.285 < 7.9.1.285 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T16:23:57.606Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://forums.ivanti.com/s/article/SA-2023-07-19-CVE-2023-35077", }, ], title: "CVE Program Container", }, { affected: [ { cpes: [ "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", ], defaultStatus: "unaffected", product: "endpoint_manager", vendor: "ivanti", versions: [ { lessThan: "7.9.1.285", status: "affected", version: "0", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2023-35077", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-24T15:54:38.305737Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-24T15:55:30.239Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Endpoint Manager", vendor: "Ivanti", versions: [ { lessThan: "7.9.1.285", status: "affected", version: "7.9.1.285", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "An out-of-bounds write vulnerability on windows operating systems causes the Ivanti AntiVirus Product to crash. Update to Ivanti AV Product version 7.9.1.285 or above.", }, ], metrics: [ { cvssV3_0: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, ], providerMetadata: { dateUpdated: "2023-07-21T20:51:29.385Z", orgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", shortName: "hackerone", }, references: [ { url: "https://forums.ivanti.com/s/article/SA-2023-07-19-CVE-2023-35077", }, ], }, }, cveMetadata: { assignerOrgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", assignerShortName: "hackerone", cveId: "CVE-2023-35077", datePublished: "2023-07-21T20:51:29.385Z", dateReserved: "2023-06-13T01:00:11.783Z", dateUpdated: "2024-10-24T15:55:30.239Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-32848
Vulnerability from cvelistv5
Published
2024-09-12 01:09
Modified
2024-09-12 21:18
Severity ?
EPSS score ?
Summary
An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.
References
Impacted products
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", ], defaultStatus: "affected", product: "endpoint_manager", vendor: "ivanti", versions: [ { lessThan: "2022_su6", status: "unaffected", version: "0", versionType: "custom", }, { lessThan: "2024_september_security_update", status: "unaffected", version: "2024", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-32848", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-09-12T03:55:18.367651Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-09-12T21:18:06.645Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "EPM", vendor: "Ivanti", versions: [ { lessThan: "2024 September Security Update", status: "affected", version: "2024 September Security Update", versionType: "custom", }, { lessThan: "2022 SU6", status: "affected", version: "2022 SU6", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.", }, ], metrics: [ { cvssV3_0: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, }, ], providerMetadata: { dateUpdated: "2024-09-12T01:09:56.249Z", orgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", shortName: "hackerone", }, references: [ { url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022", }, ], }, }, cveMetadata: { assignerOrgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", assignerShortName: "hackerone", cveId: "CVE-2024-32848", datePublished: "2024-09-12T01:09:56.249Z", dateReserved: "2024-04-19T01:04:06.774Z", dateUpdated: "2024-09-12T21:18:06.645Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-29825
Vulnerability from cvelistv5
Published
2024-05-31 17:38
Modified
2024-08-02 01:17
Severity ?
EPSS score ?
Summary
An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code.
References
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "endpoint_manager", vendor: "ivanti", versions: [ { lessThanOrEqual: "2022 SU5", status: "affected", version: "0", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-29825", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-06-03T16:50:12.284688Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-06-04T17:57:32.267Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-02T01:17:57.543Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "EPM", vendor: "Ivanti", versions: [ { lessThanOrEqual: "2022 SU5", status: "affected", version: "2022 SU5", versionType: "semver", }, ], }, ], descriptions: [ { lang: "en", value: "An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code.", }, ], metrics: [ { cvssV3_0: { baseScore: 9.6, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, }, ], providerMetadata: { dateUpdated: "2024-05-31T17:38:31.330Z", orgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", shortName: "hackerone", }, references: [ { url: "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", }, ], }, }, cveMetadata: { assignerOrgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", assignerShortName: "hackerone", cveId: "CVE-2024-29825", datePublished: "2024-05-31T17:38:31.330Z", dateReserved: "2024-03-20T01:04:06.690Z", dateUpdated: "2024-08-02T01:17:57.543Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-32845
Vulnerability from cvelistv5
Published
2024-09-12 01:09
Modified
2024-09-12 21:14
Severity ?
EPSS score ?
Summary
An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.
References
Impacted products
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", ], defaultStatus: "affected", product: "endpoint_manager", vendor: "ivanti", versions: [ { lessThan: "2022_su6", status: "unaffected", version: "0", versionType: "custom", }, { lessThan: "2024_september_security_update", status: "unaffected", version: "2024", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-32845", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-09-12T03:55:15.449457Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-09-12T21:14:44.010Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "EPM", vendor: "Ivanti", versions: [ { lessThan: "2024 September Security Update", status: "affected", version: "2024 September Security Update", versionType: "custom", }, { lessThan: "2022 SU6", status: "affected", version: "2022 SU6", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.", }, ], metrics: [ { cvssV3_0: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, }, ], providerMetadata: { dateUpdated: "2024-09-12T01:09:56.175Z", orgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", shortName: "hackerone", }, references: [ { url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022", }, ], }, }, cveMetadata: { assignerOrgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", assignerShortName: "hackerone", cveId: "CVE-2024-32845", datePublished: "2024-09-12T01:09:56.175Z", dateReserved: "2024-04-19T01:04:06.774Z", dateUpdated: "2024-09-12T21:14:44.010Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-11463
Vulnerability from cvelistv5
Published
2017-12-11 06:00
Modified
2024-08-05 18:12
Severity ?
EPSS score ?
Summary
In Ivanti Service Desk (formerly LANDESK Management Suite) versions between 2016.3 and 2017.3, an Unrestricted Direct Object Reference leads to referencing/updating objects belonging to other users. In other words, a normal user can send requests to a specific URI with the target user's username in an HTTP payload in order to retrieve a key/token and use it to access/update objects belonging to other users. Such objects could be user profiles, tickets, incidents, etc.
References
▼ | URL | Tags |
---|---|---|
https://gist.github.com/lazyhack3r/439e92419c552b5dc82b2f5e832c8bfb | x_refsource_MISC | |
https://community.ivanti.com/docs/DOC-66252 | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T18:12:39.572Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://gist.github.com/lazyhack3r/439e92419c552b5dc82b2f5e832c8bfb", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://community.ivanti.com/docs/DOC-66252", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2017-12-11T00:00:00", descriptions: [ { lang: "en", value: "In Ivanti Service Desk (formerly LANDESK Management Suite) versions between 2016.3 and 2017.3, an Unrestricted Direct Object Reference leads to referencing/updating objects belonging to other users. In other words, a normal user can send requests to a specific URI with the target user's username in an HTTP payload in order to retrieve a key/token and use it to access/update objects belonging to other users. Such objects could be user profiles, tickets, incidents, etc.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-03-27T15:57:02", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://gist.github.com/lazyhack3r/439e92419c552b5dc82b2f5e832c8bfb", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://community.ivanti.com/docs/DOC-66252", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-11463", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In Ivanti Service Desk (formerly LANDESK Management Suite) versions between 2016.3 and 2017.3, an Unrestricted Direct Object Reference leads to referencing/updating objects belonging to other users. In other words, a normal user can send requests to a specific URI with the target user's username in an HTTP payload in order to retrieve a key/token and use it to access/update objects belonging to other users. Such objects could be user profiles, tickets, incidents, etc.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://gist.github.com/lazyhack3r/439e92419c552b5dc82b2f5e832c8bfb", refsource: "MISC", url: "https://gist.github.com/lazyhack3r/439e92419c552b5dc82b2f5e832c8bfb", }, { name: "https://community.ivanti.com/docs/DOC-66252", refsource: "CONFIRM", url: "https://community.ivanti.com/docs/DOC-66252", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-11463", datePublished: "2017-12-11T06:00:00", dateReserved: "2017-07-19T00:00:00", dateUpdated: "2024-08-05T18:12:39.572Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-29824
Vulnerability from cvelistv5
Published
2024-05-31 17:38
Modified
2024-11-05 04:55
Severity ?
EPSS score ?
Summary
An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code.
References
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "endpoint_manager", vendor: "ivanti", versions: [ { lessThanOrEqual: "2022_su5", status: "affected", version: "0", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-29824", options: [ { Exploitation: "active", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-10-15T00:00:00+00:00", version: "2.0.3", }, type: "ssvc", }, }, { other: { content: { dateAdded: "2024-10-02", reference: "https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json", }, type: "kev", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-11-05T04:55:40.635Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, timeline: [ { lang: "en", time: "2024-10-02T00:00:00+00:00", value: "CVE-2024-29824 added to CISA KEV", }, ], title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-02T01:17:57.983Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "EPM", vendor: "Ivanti", versions: [ { lessThanOrEqual: "2022 SU5", status: "affected", version: "2022 SU5", versionType: "semver", }, ], }, ], descriptions: [ { lang: "en", value: "An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code.", }, ], metrics: [ { cvssV3_0: { baseScore: 9.6, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, }, ], providerMetadata: { dateUpdated: "2024-05-31T17:38:31.331Z", orgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", shortName: "hackerone", }, references: [ { url: "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", }, ], }, }, cveMetadata: { assignerOrgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", assignerShortName: "hackerone", cveId: "CVE-2024-29824", datePublished: "2024-05-31T17:38:31.331Z", dateReserved: "2024-03-20T01:04:06.689Z", dateUpdated: "2024-11-05T04:55:40.635Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-10651
Vulnerability from cvelistv5
Published
2019-07-11 17:31
Modified
2024-08-04 22:31
Severity ?
EPSS score ?
Summary
An issue was discovered in the Core Server in Ivanti Endpoint Manager (EPM) 2017.3 before SU7 and 2018.x before 2018.3 SU3, with remote code execution. In other words, the issue affects 2017.3, 2018.1, and 2018.3 installations that lack the April 2019 update.
References
▼ | URL | Tags |
---|---|---|
https://forums.ivanti.com/s/article/Security-Alert-Ivanti-Endpoint-Manager-April-2019 | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T22:31:59.925Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://forums.ivanti.com/s/article/Security-Alert-Ivanti-Endpoint-Manager-April-2019", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "An issue was discovered in the Core Server in Ivanti Endpoint Manager (EPM) 2017.3 before SU7 and 2018.x before 2018.3 SU3, with remote code execution. In other words, the issue affects 2017.3, 2018.1, and 2018.3 installations that lack the April 2019 update.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-07-11T17:31:15", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://forums.ivanti.com/s/article/Security-Alert-Ivanti-Endpoint-Manager-April-2019", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2019-10651", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An issue was discovered in the Core Server in Ivanti Endpoint Manager (EPM) 2017.3 before SU7 and 2018.x before 2018.3 SU3, with remote code execution. In other words, the issue affects 2017.3, 2018.1, and 2018.3 installations that lack the April 2019 update.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://forums.ivanti.com/s/article/Security-Alert-Ivanti-Endpoint-Manager-April-2019", refsource: "CONFIRM", url: "https://forums.ivanti.com/s/article/Security-Alert-Ivanti-Endpoint-Manager-April-2019", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2019-10651", datePublished: "2019-07-11T17:31:15", dateReserved: "2019-03-30T00:00:00", dateUpdated: "2024-08-04T22:31:59.925Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-35084
Vulnerability from cvelistv5
Published
2023-10-18 03:52
Modified
2024-09-13 15:00
Severity ?
EPSS score ?
Summary
Unsafe Deserialization of User Input could lead to Execution of Unauthorized Operations in Ivanti Endpoint Manager 2022 su3 and all previous versions, which could allow an attacker to execute commands remotely.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Ivanti | Endpoint Manager |
Patch: 2022 su3 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T16:23:59.084Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://forums.ivanti.com/s/article/SA-2023-08-08-CVE-2023-35084?language=en_US", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-35084", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-09-13T14:59:52.715611Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-13T15:00:03.906Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "affected", product: "Endpoint Manager", vendor: "Ivanti", versions: [ { lessThan: "2022 su3", status: "unaffected", version: "2022 su3", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "Unsafe Deserialization of User Input could lead to Execution of Unauthorized Operations in Ivanti Endpoint Manager 2022 su3 and all previous versions, which could allow an attacker to execute commands remotely.", }, ], providerMetadata: { dateUpdated: "2023-10-18T03:52:06.581Z", orgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", shortName: "hackerone", }, references: [ { url: "https://forums.ivanti.com/s/article/SA-2023-08-08-CVE-2023-35084?language=en_US", }, ], }, }, cveMetadata: { assignerOrgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", assignerShortName: "hackerone", cveId: "CVE-2023-35084", datePublished: "2023-10-18T03:52:06.581Z", dateReserved: "2023-06-13T01:00:11.784Z", dateUpdated: "2024-09-13T15:00:03.906Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-29823
Vulnerability from cvelistv5
Published
2024-05-31 17:38
Modified
2024-08-02 01:17
Severity ?
EPSS score ?
Summary
An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code.
References
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "endpoint_manager", vendor: "ivanti", versions: [ { lessThanOrEqual: "2022 SU5", status: "affected", version: "0", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-29823", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-06-03T16:37:56.903457Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-06-04T17:58:00.907Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-02T01:17:57.385Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "EPM", vendor: "Ivanti", versions: [ { lessThanOrEqual: "2022 SU5", status: "affected", version: "2022 SU5", versionType: "semver", }, ], }, ], descriptions: [ { lang: "en", value: "An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code. ", }, ], metrics: [ { cvssV3_0: { baseScore: 9.6, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, }, ], providerMetadata: { dateUpdated: "2024-05-31T17:38:31.409Z", orgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", shortName: "hackerone", }, references: [ { url: "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", }, ], }, }, cveMetadata: { assignerOrgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", assignerShortName: "hackerone", cveId: "CVE-2024-29823", datePublished: "2024-05-31T17:38:31.409Z", dateReserved: "2024-03-20T01:04:06.689Z", dateUpdated: "2024-08-02T01:17:57.385Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-32842
Vulnerability from cvelistv5
Published
2024-09-12 01:09
Modified
2024-09-12 21:13
Severity ?
EPSS score ?
Summary
An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.
References
Impacted products
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", ], defaultStatus: "affected", product: "endpoint_manager", vendor: "ivanti", versions: [ { lessThan: "2022_su6", status: "unaffected", version: "0", versionType: "custom", }, { lessThan: "2024_september_security_update", status: "unaffected", version: "2024", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-32842", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-09-12T03:55:12.817508Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-09-12T21:13:06.489Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "EPM", vendor: "Ivanti", versions: [ { lessThan: "2024 September Security Update", status: "affected", version: "2024 September Security Update", versionType: "custom", }, { lessThan: "2022 SU6", status: "affected", version: "2022 SU6", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.", }, ], metrics: [ { cvssV3_0: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, }, ], providerMetadata: { dateUpdated: "2024-09-12T01:09:56.173Z", orgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", shortName: "hackerone", }, references: [ { url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022", }, ], }, }, cveMetadata: { assignerOrgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", assignerShortName: "hackerone", cveId: "CVE-2024-32842", datePublished: "2024-09-12T01:09:56.173Z", dateReserved: "2024-04-19T01:04:06.774Z", dateUpdated: "2024-09-12T21:13:06.489Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-35259
Vulnerability from cvelistv5
Published
2022-12-05 00:00
Modified
2024-08-03 09:29
Severity ?
EPSS score ?
Summary
XML Injection with Endpoint Manager 2022. 3 and below causing a download of a malicious file to run and possibly execute to gain unauthorized privileges.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Ivanti Endpoint Manager |
Version: 2022.3 and below |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T09:29:17.529Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-for-Ivanti-Endpoint-Manager-Client-CVE-2022-35259?language=en_US", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Ivanti Endpoint Manager", vendor: "n/a", versions: [ { status: "affected", version: "2022.3 and below", }, ], }, ], descriptions: [ { lang: "en", value: "XML Injection with Endpoint Manager 2022. 3 and below causing a download of a malicious file to run and possibly execute to gain unauthorized privileges.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-91", description: "XML Injection (CWE-91)", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-12-05T00:00:00", orgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", shortName: "hackerone", }, references: [ { url: "https://forums.ivanti.com/s/article/Security-Advisory-for-Ivanti-Endpoint-Manager-Client-CVE-2022-35259?language=en_US", }, ], }, }, cveMetadata: { assignerOrgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", assignerShortName: "hackerone", cveId: "CVE-2022-35259", datePublished: "2022-12-05T00:00:00", dateReserved: "2022-07-06T00:00:00", dateUpdated: "2024-08-03T09:29:17.529Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-34783
Vulnerability from cvelistv5
Published
2024-09-12 01:09
Modified
2024-09-12 21:19
Severity ?
EPSS score ?
Summary
An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.
References
Impacted products
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", ], defaultStatus: "affected", product: "endpoint_manager", vendor: "ivanti", versions: [ { lessThan: "2022_su6", status: "unaffected", version: "0", versionType: "custom", }, { lessThan: "2024_september_security_update", status: "unaffected", version: "2024", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-34783", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-09-12T03:55:20.889611Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-09-12T21:19:26.664Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "EPM", vendor: "Ivanti", versions: [ { lessThan: "2024 September Security Update", status: "affected", version: "2024 September Security Update", versionType: "custom", }, { lessThan: "2022 SU6", status: "affected", version: "2022 SU6", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.", }, ], metrics: [ { cvssV3_0: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, }, ], providerMetadata: { dateUpdated: "2024-09-12T01:09:56.337Z", orgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", shortName: "hackerone", }, references: [ { url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022", }, ], }, }, cveMetadata: { assignerOrgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", assignerShortName: "hackerone", cveId: "CVE-2024-34783", datePublished: "2024-09-12T01:09:56.337Z", dateReserved: "2024-05-09T01:04:06.436Z", dateUpdated: "2024-09-12T21:19:26.664Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-29830
Vulnerability from cvelistv5
Published
2024-05-31 17:38
Modified
2024-08-02 01:17
Severity ?
EPSS score ?
Summary
An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an authenticated attacker within the same network to execute arbitrary code.
References
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "endpoint_manager", vendor: "ivanti", versions: [ { lessThanOrEqual: "2022 SU5", status: "affected", version: "0", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-29830", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-06-03T16:47:38.763234Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-06-04T17:57:30.545Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-02T01:17:57.943Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "EPM", vendor: "Ivanti", versions: [ { lessThanOrEqual: "2022 SU5", status: "affected", version: "2022 SU5", versionType: "semver", }, ], }, ], descriptions: [ { lang: "en", value: "An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an authenticated attacker within the same network to execute arbitrary code.", }, ], metrics: [ { cvssV3_0: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, }, ], providerMetadata: { dateUpdated: "2024-05-31T17:38:31.352Z", orgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", shortName: "hackerone", }, references: [ { url: "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", }, ], }, }, cveMetadata: { assignerOrgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", assignerShortName: "hackerone", cveId: "CVE-2024-29830", datePublished: "2024-05-31T17:38:31.352Z", dateReserved: "2024-03-20T01:04:06.690Z", dateUpdated: "2024-08-02T01:17:57.943Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-34785
Vulnerability from cvelistv5
Published
2024-09-12 01:09
Modified
2024-09-12 21:16
Severity ?
EPSS score ?
Summary
An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.
References
Impacted products
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", ], defaultStatus: "affected", product: "endpoint_manager", vendor: "ivanti", versions: [ { lessThan: "2022_su6", status: "unaffected", version: "0", versionType: "custom", }, { lessThan: "2024_september_security_update", status: "unaffected", version: "2024", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-34785", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-09-12T03:55:22.154437Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-09-12T21:16:44.057Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "EPM", vendor: "Ivanti", versions: [ { lessThan: "2024 September Security Update", status: "affected", version: "2024 September Security Update", versionType: "custom", }, { lessThan: "2022 SU6", status: "affected", version: "2022 SU6", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.", }, ], metrics: [ { cvssV3_0: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, }, ], providerMetadata: { dateUpdated: "2024-09-12T01:09:56.248Z", orgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", shortName: "hackerone", }, references: [ { url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022", }, ], }, }, cveMetadata: { assignerOrgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", assignerShortName: "hackerone", cveId: "CVE-2024-34785", datePublished: "2024-09-12T01:09:56.248Z", dateReserved: "2024-05-09T01:04:06.436Z", dateUpdated: "2024-09-12T21:16:44.057Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-50329
Vulnerability from cvelistv5
Published
2024-11-12 15:41
Modified
2024-11-19 04:56
Severity ?
EPSS score ?
Summary
Path traversal in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a remote unauthenticated attacker to achieve remote code execution. User interaction is required.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Ivanti | Endpoint Manager |
Patch: 2024 November Security Update Patch: 2022 SU6 November Security Update |
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", ], defaultStatus: "unaffected", product: "endpoint_manager", vendor: "ivanti", versions: [ { status: "affected", version: "2024_november_security_update", }, { status: "affected", version: "2022_su6_november_security_update", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-50329", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-18T00:00:00+00:00", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-19T04:56:08.860Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "affected", product: "Endpoint Manager", vendor: "Ivanti", versions: [ { status: "unaffected", version: "2024 November Security Update", versionType: "custom", }, { status: "unaffected", version: "2022 SU6 November Security Update", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<span style=\"background-color: rgb(255, 255, 255);\">Path traversal in Ivanti Endpoint Manager before </span><span style=\"background-color: rgb(255, 255, 255);\">2024 November Security Update or 2022 SU6 November Security Update</span><span style=\"background-color: rgb(255, 255, 255);\"> allows a remote unauthenticated attacker to achieve remote code execution. User interaction is required.</span><span style=\"background-color: rgb(255, 255, 255);\"> </span>", }, ], value: "Path traversal in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a remote unauthenticated attacker to achieve remote code execution. User interaction is required.", }, ], impacts: [ { capecId: "CAPEC-549", descriptions: [ { lang: "en", value: "CAPEC-549 Local Execution of Code", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-22", description: "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-11-12T15:41:54.415Z", orgId: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", shortName: "ivanti", }, references: [ { url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2024-for-EPM-2024-and-EPM-2022", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", assignerShortName: "ivanti", cveId: "CVE-2024-50329", datePublished: "2024-11-12T15:41:54.415Z", dateReserved: "2024-10-22T16:41:33.251Z", dateUpdated: "2024-11-19T04:56:08.860Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-13161
Vulnerability from cvelistv5
Published
2025-01-14 17:11
Modified
2025-03-10 22:20
Severity ?
EPSS score ?
Summary
Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Ivanti | Endpoint Manager |
Patch: 2024 January-2025 Security Update Patch: 2022 SU6 January-2025 Security Update |
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-13161", options: [ { Exploitation: "active", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-03-10T17:12:06.481687Z", version: "2.0.3", }, type: "ssvc", }, }, { other: { content: { dateAdded: "2025-03-10", reference: "https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json", }, type: "kev", }, }, ], providerMetadata: { dateUpdated: "2025-03-10T22:20:22.805Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, references: [ { tags: [ "exploit", ], url: "https://www.horizon3.ai/attack-research/attack-blogs/ivanti-endpoint-manager-multiple-credential-coercion-vulnerabilities/", }, ], timeline: [ { lang: "en", time: "2025-03-10T00:00:00+00:00", value: "CVE-2024-13161 added to CISA KEV", }, ], title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "affected", product: "Endpoint Manager", vendor: "Ivanti", versions: [ { status: "unaffected", version: "2024 January-2025 Security Update", versionType: "custom", }, { status: "unaffected", version: "2022 SU6 January-2025 Security Update", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<span style=\"background-color: rgb(255, 255, 255);\">Absolute path traversal </span><span style=\"background-color: rgb(255, 255, 255);\">in Ivanti EPM before </span><span style=\"background-color: rgb(255, 255, 255);\">the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update</span><span style=\"background-color: rgb(255, 255, 255);\"> allows a remote unauthenticated attacker to leak sensitive information.</span>", }, ], value: "Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.", }, ], impacts: [ { capecId: "CAPEC-597", descriptions: [ { lang: "en", value: "CAPEC-597 Absolute Path Traversal", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-36", description: "CWE-36 Absolute Path Traversal", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-14T17:11:32.061Z", orgId: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", shortName: "ivanti", }, references: [ { url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", assignerShortName: "ivanti", cveId: "CVE-2024-13161", datePublished: "2025-01-14T17:11:32.061Z", dateReserved: "2025-01-07T02:28:30.244Z", dateUpdated: "2025-03-10T22:20:22.805Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-32843
Vulnerability from cvelistv5
Published
2024-09-12 01:09
Modified
2024-09-12 21:16
Severity ?
EPSS score ?
Summary
An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.
References
Impacted products
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", ], defaultStatus: "affected", product: "endpoint_manager", vendor: "ivanti", versions: [ { lessThan: "2022_su6", status: "unaffected", version: "0", versionType: "custom", }, { lessThan: "2024_september_security_update", status: "unaffected", version: "2024", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-32843", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-09-12T03:55:14.040483Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-09-12T21:16:22.723Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "EPM", vendor: "Ivanti", versions: [ { lessThan: "2024 September Security Update", status: "affected", version: "2024 September Security Update", versionType: "custom", }, { lessThan: "2022 SU6", status: "affected", version: "2022 SU6", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.", }, ], metrics: [ { cvssV3_0: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, }, ], providerMetadata: { dateUpdated: "2024-09-12T01:09:56.230Z", orgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", shortName: "hackerone", }, references: [ { url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022", }, ], }, }, cveMetadata: { assignerOrgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", assignerShortName: "hackerone", cveId: "CVE-2024-32843", datePublished: "2024-09-12T01:09:56.230Z", dateReserved: "2024-04-19T01:04:06.774Z", dateUpdated: "2024-09-12T21:16:22.723Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-30121
Vulnerability from cvelistv5
Published
2022-09-23 13:37
Modified
2024-08-03 06:40
Severity ?
EPSS score ?
Summary
The “LANDesk(R) Management Agent” service exposes a socket and once connected, it is possible to launch commands only for signed executables. This is a security bug that allows a limited user to get escalated admin privileges on their system.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Ivanti Endpoint Manager |
Version: 11.0.1.951 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T06:40:47.313Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-for-Ivanti-Endpoint-Manager-Client-CVE-2022-30121?language=en_US", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Ivanti Endpoint Manager", vendor: "n/a", versions: [ { status: "affected", version: "11.0.1.951", }, ], }, ], descriptions: [ { lang: "en", value: "The “LANDesk(R) Management Agent” service exposes a socket and once connected, it is possible to launch commands only for signed executables. This is a security bug that allows a limited user to get escalated admin privileges on their system.", }, ], problemTypes: [ { descriptions: [ { description: "Privilege Escalation (CAPEC-233)", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-09-23T13:37:51", orgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", shortName: "hackerone", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-for-Ivanti-Endpoint-Manager-Client-CVE-2022-30121?language=en_US", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "support@hackerone.com", ID: "CVE-2022-30121", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Ivanti Endpoint Manager", version: { version_data: [ { version_value: "11.0.1.951", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The “LANDesk(R) Management Agent” service exposes a socket and once connected, it is possible to launch commands only for signed executables. This is a security bug that allows a limited user to get escalated admin privileges on their system.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Privilege Escalation (CAPEC-233)", }, ], }, ], }, references: { reference_data: [ { name: "https://forums.ivanti.com/s/article/Security-Advisory-for-Ivanti-Endpoint-Manager-Client-CVE-2022-30121?language=en_US", refsource: "MISC", url: "https://forums.ivanti.com/s/article/Security-Advisory-for-Ivanti-Endpoint-Manager-Client-CVE-2022-30121?language=en_US", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", assignerShortName: "hackerone", cveId: "CVE-2022-30121", datePublished: "2022-09-23T13:37:51", dateReserved: "2022-05-02T00:00:00", dateUpdated: "2024-08-03T06:40:47.313Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-50322
Vulnerability from cvelistv5
Published
2024-11-12 15:36
Modified
2024-11-19 04:55
Severity ?
EPSS score ?
Summary
Path traversal in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a local unauthenticated attacker to achieve code execution. User interaction is required.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Ivanti | Endpoint Manager |
Patch: 2024 November Security Update Patch: 2022 SU6 November Security Update |
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", ], defaultStatus: "unaffected", product: "endpoint_manager", vendor: "ivanti", versions: [ { status: "affected", version: "2024_november_security_update", }, { status: "affected", version: "2022_su6_november_security_update", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-50322", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-18T00:00:00+00:00", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-19T04:55:49.893Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "affected", product: "Endpoint Manager", vendor: "Ivanti", versions: [ { status: "unaffected", version: "2024 November Security Update", versionType: "custom", }, { status: "unaffected", version: "2022 SU6 November Security Update", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<span style=\"background-color: rgb(255, 255, 255);\">Path traversal in Ivanti Endpoint Manager before </span><span style=\"background-color: rgb(255, 255, 255);\">2024 November Security Update or 2022 SU6 November Security Update</span><span style=\"background-color: rgb(255, 255, 255);\"> allows a local unauthenticated attacker to achieve code execution. User interaction is required.</span><span style=\"background-color: rgb(255, 255, 255);\"> </span>", }, ], value: "Path traversal in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a local unauthenticated attacker to achieve code execution. User interaction is required.", }, ], impacts: [ { capecId: "CAPEC-549", descriptions: [ { lang: "en", value: "CAPEC-549 Local Execution of Code", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-22", description: "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-11-12T15:36:09.760Z", orgId: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", shortName: "ivanti", }, references: [ { url: "https://https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2024-for-EPM-2024-and-EPM-2022", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", assignerShortName: "ivanti", cveId: "CVE-2024-50322", datePublished: "2024-11-12T15:36:09.760Z", dateReserved: "2024-10-22T16:41:33.250Z", dateUpdated: "2024-11-19T04:55:49.893Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-8441
Vulnerability from cvelistv5
Published
2024-09-10 21:01
Modified
2024-09-12 03:55
Severity ?
EPSS score ?
Summary
An uncontrolled search path in the agent of Ivanti EPM before 2022 SU6, or the 2024 September update allows a local authenticated attacker with admin privileges to escalate their privileges to SYSTEM.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Ivanti | Endpoint Manager |
Patch: 2022 SU6 Patch: 2024 September Security Update |
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "endpoint_manager", vendor: "ivanti", versions: [ { lessThan: "2022_su6", status: "affected", version: "0", versionType: "custom", }, { status: "affected", version: "2024_september_update", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-8441", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-09-11T00:00:00+00:00", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-12T03:55:23.682Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "affected", product: "Endpoint Manager", vendor: "Ivanti", versions: [ { status: "unaffected", version: "2022 SU6", versionType: "custom", }, { status: "unaffected", version: "2024 September Security Update", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<span style=\"background-color: rgb(255, 255, 255);\">An uncontrolled search path in the agent of Ivanti EPM before 2022 SU6, or the 2024 September update allows a local authenticated attacker with admin privileges to escalate their privileges to SYSTEM.</span><span style=\"background-color: rgb(255, 255, 255);\"> </span>", }, ], value: "An uncontrolled search path in the agent of Ivanti EPM before 2022 SU6, or the 2024 September update allows a local authenticated attacker with admin privileges to escalate their privileges to SYSTEM.", }, ], impacts: [ { capecId: "CAPEC-233", descriptions: [ { lang: "en", value: "CAPEC-233 Privilege Escalation", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-427", description: "CWE-427 Uncontrolled Search Path Element", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-09-10T21:01:09.475Z", orgId: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", shortName: "ivanti", }, references: [ { url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", assignerShortName: "ivanti", cveId: "CVE-2024-8441", datePublished: "2024-09-10T21:01:09.475Z", dateReserved: "2024-09-04T20:00:47.915Z", dateUpdated: "2024-09-12T03:55:23.682Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-8191
Vulnerability from cvelistv5
Published
2024-09-10 20:50
Modified
2024-09-12 03:55
Severity ?
EPSS score ?
Summary
SQL injection in the management console of Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote unauthenticated attacker to achieve remote code execution.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Ivanti | Endpoint Manager |
Patch: 2022 SU6 Patch: 2024 September Security Update |
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", ], defaultStatus: "affected", product: "endpoint_manager", vendor: "ivanti", versions: [ { lessThan: "2022_su6", status: "unaffected", version: "0", versionType: "custom", }, { lessThan: "2024_september_security_update", status: "unaffected", version: "2024", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-8191", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-09-11T00:00:00+00:00", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-12T03:55:08.946Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "affected", product: "Endpoint Manager", vendor: "Ivanti", versions: [ { status: "unaffected", version: "2022 SU6", versionType: "custom", }, { status: "unaffected", version: "2024 September Security Update", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<span style=\"background-color: rgb(255, 255, 255);\">SQL injection in the management console of Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote unauthenticated attacker to achieve remote code execution.</span><span style=\"background-color: rgb(255, 255, 255);\"> </span>", }, ], value: "SQL injection in the management console of Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote unauthenticated attacker to achieve remote code execution.", }, ], impacts: [ { capecId: "CAPEC-66", descriptions: [ { lang: "en", value: "CAPEC-66 SQL Injection", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-09-10T20:50:24.547Z", orgId: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", shortName: "ivanti", }, references: [ { url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", assignerShortName: "ivanti", cveId: "CVE-2024-8191", datePublished: "2024-09-10T20:50:24.547Z", dateReserved: "2024-08-26T19:21:05.926Z", dateUpdated: "2024-09-12T03:55:08.946Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-13770
Vulnerability from cvelistv5
Published
2020-11-12 17:38
Modified
2024-08-04 12:25
Severity ?
EPSS score ?
Summary
Several services are accessing named pipes in Ivanti Endpoint Manager through 2020.1.1 with default or overly permissive security attributes; as these services run as user ‘NT AUTHORITY\SYSTEM’, the issue can be used to escalate privileges from a local standard or service account having SeImpersonatePrivilege (eg. user ‘NT AUTHORITY\NETWORK SERVICE’).
References
▼ | URL | Tags |
---|---|---|
https://labs.jumpsec.com/advisory-cve-2020-13770-ivanti-uem-named-pipe-token-impersonation/ | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T12:25:16.560Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://labs.jumpsec.com/advisory-cve-2020-13770-ivanti-uem-named-pipe-token-impersonation/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Several services are accessing named pipes in Ivanti Endpoint Manager through 2020.1.1 with default or overly permissive security attributes; as these services run as user ‘NT AUTHORITY\\SYSTEM’, the issue can be used to escalate privileges from a local standard or service account having SeImpersonatePrivilege (eg. user ‘NT AUTHORITY\\NETWORK SERVICE’).", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-11-12T17:38:03", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://labs.jumpsec.com/advisory-cve-2020-13770-ivanti-uem-named-pipe-token-impersonation/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2020-13770", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Several services are accessing named pipes in Ivanti Endpoint Manager through 2020.1.1 with default or overly permissive security attributes; as these services run as user ‘NT AUTHORITY\\SYSTEM’, the issue can be used to escalate privileges from a local standard or service account having SeImpersonatePrivilege (eg. user ‘NT AUTHORITY\\NETWORK SERVICE’).", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://labs.jumpsec.com/advisory-cve-2020-13770-ivanti-uem-named-pipe-token-impersonation/", refsource: "MISC", url: "https://labs.jumpsec.com/advisory-cve-2020-13770-ivanti-uem-named-pipe-token-impersonation/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2020-13770", datePublished: "2020-11-12T17:38:03", dateReserved: "2020-06-02T00:00:00", dateUpdated: "2024-08-04T12:25:16.560Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-50326
Vulnerability from cvelistv5
Published
2024-11-12 15:40
Modified
2024-11-19 04:56
Severity ?
EPSS score ?
Summary
SQL injection in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a remote authenticated attacker with admin privileges to achieve remote code execution.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Ivanti | Endpoint Manager |
Patch: 2024 November Security Update Patch: 2022 SU6 November Security Update |
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", ], defaultStatus: "unaffected", product: "endpoint_manager", vendor: "ivanti", versions: [ { status: "affected", version: "2024_november_security_update", }, { status: "affected", version: "2022_su6_november_security_update", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-50326", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-18T00:00:00+00:00", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-19T04:56:00.999Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "affected", product: "Endpoint Manager", vendor: "Ivanti", versions: [ { status: "unaffected", version: "2024 November Security Update", versionType: "custom", }, { status: "unaffected", version: "2022 SU6 November Security Update", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<span style=\"background-color: rgb(255, 255, 255);\">SQL injection in Ivanti Endpoint Manager before </span><span style=\"background-color: rgb(255, 255, 255);\">2024 November Security Update or 2022 SU6 November Security Update</span><span style=\"background-color: rgb(255, 255, 255);\"> allows a remote authenticated attacker with admin privileges to achieve remote code execution.</span><span style=\"background-color: rgb(255, 255, 255);\"> </span>", }, ], value: "SQL injection in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a remote authenticated attacker with admin privileges to achieve remote code execution.", }, ], impacts: [ { capecId: "CAPEC-66", descriptions: [ { lang: "en", value: "CAPEC-66 SQL Injection", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-11-12T15:40:06.902Z", orgId: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", shortName: "ivanti", }, references: [ { url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2024-for-EPM-2024-and-EPM-2022", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", assignerShortName: "ivanti", cveId: "CVE-2024-50326", datePublished: "2024-11-12T15:40:06.902Z", dateReserved: "2024-10-22T16:41:33.251Z", dateUpdated: "2024-11-19T04:56:00.999Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-29822
Vulnerability from cvelistv5
Published
2024-05-31 17:38
Modified
2024-08-02 01:17
Severity ?
EPSS score ?
Summary
An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code.
References
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "endpoint_manager", vendor: "ivanti", versions: [ { lessThanOrEqual: "2022 SU5", status: "affected", version: "0", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-29822", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-06-03T16:42:17.616743Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-06-04T17:58:09.234Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-02T01:17:58.027Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "EPM", vendor: "Ivanti", versions: [ { lessThanOrEqual: "2022 SU5", status: "affected", version: "2022 SU5", versionType: "semver", }, ], }, ], descriptions: [ { lang: "en", value: "An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code. ", }, ], metrics: [ { cvssV3_0: { baseScore: 9.6, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, }, ], providerMetadata: { dateUpdated: "2024-05-31T17:38:31.401Z", orgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", shortName: "hackerone", }, references: [ { url: "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", }, ], }, }, cveMetadata: { assignerOrgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", assignerShortName: "hackerone", cveId: "CVE-2024-29822", datePublished: "2024-05-31T17:38:31.401Z", dateReserved: "2024-03-20T01:04:06.689Z", dateUpdated: "2024-08-02T01:17:58.027Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-39336
Vulnerability from cvelistv5
Published
2024-01-09 01:33
Modified
2024-08-02 18:02
Severity ?
EPSS score ?
Summary
An unspecified SQL Injection vulnerability in Ivanti Endpoint Manager released prior to 2022 SU 5 allows an attacker with access to the internal network to execute arbitrary SQL queries and retrieve output without the need for authentication. Under specific circumstances, this may also lead to RCE on the core server.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Ivanti | Endpoint Manager |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T18:02:06.908Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://forums.ivanti.com/s/article/SA-2023-12-19-CVE-2023-39336?language=en_US", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "affected", product: "Endpoint Manager", vendor: "Ivanti", versions: [ { lessThan: "2022 SU 5", status: "unaffected", version: "2022 SU 5", versionType: "semver", }, ], }, ], descriptions: [ { lang: "en", value: "An unspecified SQL Injection vulnerability in Ivanti Endpoint Manager released prior to 2022 SU 5 allows an attacker with access to the internal network to execute arbitrary SQL queries and retrieve output without the need for authentication. Under specific circumstances, this may also lead to RCE on the core server. ", }, ], metrics: [ { cvssV3_0: { baseScore: 9.6, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, }, ], providerMetadata: { dateUpdated: "2024-01-09T01:33:05.875Z", orgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", shortName: "hackerone", }, references: [ { url: "https://forums.ivanti.com/s/article/SA-2023-12-19-CVE-2023-39336?language=en_US", }, ], }, }, cveMetadata: { assignerOrgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", assignerShortName: "hackerone", cveId: "CVE-2023-39336", datePublished: "2024-01-09T01:33:05.875Z", dateReserved: "2023-07-28T01:00:12.350Z", dateUpdated: "2024-08-02T18:02:06.908Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-28324
Vulnerability from cvelistv5
Published
2023-06-30 23:40
Modified
2024-09-25 13:11
Severity ?
EPSS score ?
Summary
A improper input validation vulnerability exists in Ivanti Endpoint Manager 2022 and below that could allow privilege escalation or remote code execution.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Ivanti | Ivanti Endpoint Manager |
Version: 2022 ≤ 2022 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T12:38:24.970Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://forums.ivanti.com/s/article/SA-2023-06-06-CVE-2023-28324", }, ], title: "CVE Program Container", }, { affected: [ { cpes: [ "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", ], defaultStatus: "unaffected", product: "endpoint_manager", vendor: "ivanti", versions: [ { lessThanOrEqual: "2022_Su2", status: "affected", version: "2022", versionType: "semver", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2023-28324", options: [ { Exploitation: "poc", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-09-25T03:55:39.861983Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-20", description: "CWE-20 Improper Input Validation", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-09-25T13:11:44.228Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Ivanti Endpoint Manager", vendor: "Ivanti", versions: [ { lessThanOrEqual: "2022", status: "affected", version: "2022", versionType: "semver", }, ], }, ], descriptions: [ { lang: "en", value: "A improper input validation vulnerability exists in Ivanti Endpoint Manager 2022 and below that could allow privilege escalation or remote code execution.", }, ], providerMetadata: { dateUpdated: "2023-06-30T23:40:19.571Z", orgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", shortName: "hackerone", }, references: [ { url: "https://forums.ivanti.com/s/article/SA-2023-06-06-CVE-2023-28324", }, ], }, }, cveMetadata: { assignerOrgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", assignerShortName: "hackerone", cveId: "CVE-2023-28324", datePublished: "2023-06-30T23:40:19.571Z", dateReserved: "2023-03-14T01:00:13.190Z", dateUpdated: "2024-09-25T13:11:44.228Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-35083
Vulnerability from cvelistv5
Published
2023-10-18 03:52
Modified
2024-09-13 14:55
Severity ?
EPSS score ?
Summary
Allows an authenticated attacker with network access to read arbitrary files on Endpoint Manager recently discovered on 2022 SU3 and all previous versions potentially leading to the leakage of sensitive information.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Ivanti | Endpoint Manager |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T16:23:57.610Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://forums.ivanti.com/s/article/SA-2023-06-20-CVE-2023-35083?language=en_US", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-35083", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-09-13T14:55:18.435410Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-13T14:55:27.624Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "affected", product: "Endpoint Manager", vendor: "Ivanti", versions: [ { lessThan: "2022 su3", status: "unaffected", version: "2022 su3", versionType: "semver", }, ], }, ], descriptions: [ { lang: "en", value: "Allows an authenticated attacker with network access to read arbitrary files on Endpoint Manager recently discovered on 2022 SU3 and all previous versions potentially leading to the leakage of sensitive information.", }, ], providerMetadata: { dateUpdated: "2023-10-18T03:52:12.988Z", orgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", shortName: "hackerone", }, references: [ { url: "https://forums.ivanti.com/s/article/SA-2023-06-20-CVE-2023-35083?language=en_US", }, ], }, }, cveMetadata: { assignerOrgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", assignerShortName: "hackerone", cveId: "CVE-2023-35083", datePublished: "2023-10-18T03:52:12.988Z", dateReserved: "2023-06-13T01:00:11.784Z", dateUpdated: "2024-09-13T14:55:27.624Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-8322
Vulnerability from cvelistv5
Published
2024-09-10 20:59
Modified
2024-09-11 13:50
Severity ?
EPSS score ?
Summary
Weak authentication in Patch Management of Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker to access restricted functionality.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Ivanti | Endpoint Manager |
Patch: 2022 SU6 Patch: 2024 September Security Update |
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-8322", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-09-11T13:50:23.192898Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-11T13:50:36.958Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "affected", product: "Endpoint Manager", vendor: "Ivanti", versions: [ { status: "unaffected", version: "2022 SU6", versionType: "custom", }, { status: "unaffected", version: "2024 September Security Update", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<span style=\"background-color: rgb(255, 255, 255);\">Weak authentication in Patch Management of Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker to access restricted functionality.</span><span style=\"background-color: rgb(255, 255, 255);\"> </span>", }, ], value: "Weak authentication in Patch Management of Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker to access restricted functionality.", }, ], impacts: [ { capecId: "CAPEC-180", descriptions: [ { lang: "en", value: "CAPEC-180 Exploiting Incorrectly Configured Access Control Security Levels", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-1390", description: "CWE-1390: Weak Authentication", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-09-10T20:59:40.339Z", orgId: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", shortName: "ivanti", }, references: [ { url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", assignerShortName: "ivanti", cveId: "CVE-2024-8322", datePublished: "2024-09-10T20:59:40.339Z", dateReserved: "2024-08-29T19:19:21.106Z", dateUpdated: "2024-09-11T13:50:36.958Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-13773
Vulnerability from cvelistv5
Published
2020-11-16 15:30
Modified
2024-08-04 12:25
Severity ?
EPSS score ?
Summary
Ivanti Endpoint Manager through 2020.1.1 allows XSS via /LDMS/frm_splitfrm.aspx, /LDMS/licensecheck.aspx, /LDMS/frm_splitcollapse.aspx, /LDMS/alert_log.aspx, /LDMS/ServerList.aspx, /LDMS/frm_coremainfrm.aspx, /LDMS/frm_findfrm.aspx, /LDMS/frm_taskfrm.aspx, and /LDMS/query_browsecomp.aspx.
References
▼ | URL | Tags |
---|---|---|
https://forums.ivanti.com/s/ | x_refsource_MISC | |
https://labs.jumpsec.com/cve-2020-13773-ivanti-uem-reflected-xss/ | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T12:25:16.530Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://forums.ivanti.com/s/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://labs.jumpsec.com/cve-2020-13773-ivanti-uem-reflected-xss/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Ivanti Endpoint Manager through 2020.1.1 allows XSS via /LDMS/frm_splitfrm.aspx, /LDMS/licensecheck.aspx, /LDMS/frm_splitcollapse.aspx, /LDMS/alert_log.aspx, /LDMS/ServerList.aspx, /LDMS/frm_coremainfrm.aspx, /LDMS/frm_findfrm.aspx, /LDMS/frm_taskfrm.aspx, and /LDMS/query_browsecomp.aspx.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-11-16T15:30:14", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://forums.ivanti.com/s/", }, { tags: [ "x_refsource_MISC", ], url: "https://labs.jumpsec.com/cve-2020-13773-ivanti-uem-reflected-xss/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2020-13773", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Ivanti Endpoint Manager through 2020.1.1 allows XSS via /LDMS/frm_splitfrm.aspx, /LDMS/licensecheck.aspx, /LDMS/frm_splitcollapse.aspx, /LDMS/alert_log.aspx, /LDMS/ServerList.aspx, /LDMS/frm_coremainfrm.aspx, /LDMS/frm_findfrm.aspx, /LDMS/frm_taskfrm.aspx, and /LDMS/query_browsecomp.aspx.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://forums.ivanti.com/s/", refsource: "MISC", url: "https://forums.ivanti.com/s/", }, { name: "https://labs.jumpsec.com/cve-2020-13773-ivanti-uem-reflected-xss/", refsource: "MISC", url: "https://labs.jumpsec.com/cve-2020-13773-ivanti-uem-reflected-xss/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2020-13773", datePublished: "2020-11-16T15:30:14", dateReserved: "2020-06-02T00:00:00", dateUpdated: "2024-08-04T12:25:16.530Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-32846
Vulnerability from cvelistv5
Published
2024-09-12 01:09
Modified
2024-09-12 21:15
Severity ?
EPSS score ?
Summary
An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.
References
Impacted products
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", ], defaultStatus: "affected", product: "endpoint_manager", vendor: "ivanti", versions: [ { lessThan: "2022_su6", status: "unaffected", version: "0", versionType: "custom", }, { lessThan: "2024_september_security_update", status: "unaffected", version: "2024", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-32846", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-09-12T03:55:16.752879Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-09-12T21:15:08.269Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "EPM", vendor: "Ivanti", versions: [ { lessThan: "2024 September Security Update", status: "affected", version: "2024 September Security Update", versionType: "custom", }, { lessThan: "2022 SU6", status: "affected", version: "2022 SU6", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.", }, ], metrics: [ { cvssV3_0: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, }, ], providerMetadata: { dateUpdated: "2024-09-12T01:09:56.175Z", orgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", shortName: "hackerone", }, references: [ { url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022", }, ], }, }, cveMetadata: { assignerOrgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", assignerShortName: "hackerone", cveId: "CVE-2024-32846", datePublished: "2024-09-12T01:09:56.175Z", dateReserved: "2024-04-19T01:04:06.774Z", dateUpdated: "2024-09-12T21:15:08.269Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-13159
Vulnerability from cvelistv5
Published
2025-01-14 17:12
Modified
2025-03-10 22:20
Severity ?
EPSS score ?
Summary
Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Ivanti | Endpoint Manager |
Patch: 2024 January-2025 Security Update Patch: 2022 SU6 January-2025 Security Update |
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-13159", options: [ { Exploitation: "active", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-03-10T17:12:15.647745Z", version: "2.0.3", }, type: "ssvc", }, }, { other: { content: { dateAdded: "2025-03-10", reference: "https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json", }, type: "kev", }, }, ], providerMetadata: { dateUpdated: "2025-03-10T22:20:23.523Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, references: [ { tags: [ "exploit", ], url: "https://www.horizon3.ai/attack-research/attack-blogs/ivanti-endpoint-manager-multiple-credential-coercion-vulnerabilities/", }, ], timeline: [ { lang: "en", time: "2025-03-10T00:00:00+00:00", value: "CVE-2024-13159 added to CISA KEV", }, ], title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "affected", product: "Endpoint Manager", vendor: "Ivanti", versions: [ { status: "unaffected", version: "2024 January-2025 Security Update", versionType: "custom", }, { status: "unaffected", version: "2022 SU6 January-2025 Security Update", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<span style=\"background-color: rgb(255, 255, 255);\">Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.</span><span style=\"background-color: rgb(255, 255, 255);\"> </span>", }, ], value: "Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.", }, ], impacts: [ { capecId: "CAPEC-597", descriptions: [ { lang: "en", value: "CAPEC-597 Absolute Path Traversal", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-36", description: "CWE-36 Absolute Path Traversal", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-14T17:12:57.652Z", orgId: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", shortName: "ivanti", }, references: [ { url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", assignerShortName: "ivanti", cveId: "CVE-2024-13159", datePublished: "2025-01-14T17:12:57.652Z", dateReserved: "2025-01-07T02:28:21.601Z", dateUpdated: "2025-03-10T22:20:23.523Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2023-10-18 04:15
Modified
2024-11-21 08:07
Severity ?
Summary
Allows an authenticated attacker with network access to read arbitrary files on Endpoint Manager recently discovered on 2022 SU3 and all previous versions potentially leading to the leakage of sensitive information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F6549B-CF5D-4607-B67D-5489905A1705", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Allows an authenticated attacker with network access to read arbitrary files on Endpoint Manager recently discovered on 2022 SU3 and all previous versions potentially leading to the leakage of sensitive information.", }, { lang: "es", value: "Permite que un atacante autenticado con acceso a la red lea archivos arbitrarios en Endpoint Manager descubierto recientemente en 2022 SU3 y todas las versiones anteriores, lo que podría provocar la fuga de información confidencial.", }, ], id: "CVE-2023-35083", lastModified: "2024-11-21T08:07:56.550", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-10-18T04:15:10.900", references: [ { source: "support@hackerone.com", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/SA-2023-06-20-CVE-2023-35083?language=en_US", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/SA-2023-06-20-CVE-2023-35083?language=en_US", }, ], sourceIdentifier: "support@hackerone.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-09-21 21:15
Modified
2024-11-21 08:13
Severity ?
Summary
An XXE (XML external entity injection) vulnerability exists in the CSEP component of Ivanti Endpoint Manager before 2022 SU4. External entity references are enabled in the XML parser configuration. Exploitation of this vulnerability can lead to file disclosure or Server Side Request Forgery.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://gist.github.com/bhyahoo/4772330b20057a271f77e690bc70f928 | Third Party Advisory | |
cve@mitre.org | https://www.ivanti.com/releases | Release Notes | |
af854a3a-2127-422b-91ae-364da2661108 | https://gist.github.com/bhyahoo/4772330b20057a271f77e690bc70f928 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.ivanti.com/releases | Release Notes |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F6549B-CF5D-4607-B67D-5489905A1705", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An XXE (XML external entity injection) vulnerability exists in the CSEP component of Ivanti Endpoint Manager before 2022 SU4. External entity references are enabled in the XML parser configuration. Exploitation of this vulnerability can lead to file disclosure or Server Side Request Forgery.", }, { lang: "es", value: "Existe una vulnerabilidad XXE (inyección de entidad externa XML) en el componente CSEP de Ivanti Endpoint Manager antes de 2022 SU4. Las referencias a entidades externas están habilitadas en la configuración del analizador XML. La explotación de esta vulnerabilidad puede provocar la divulgación de archivos o Server Side Request Forgery.", }, ], id: "CVE-2023-38343", lastModified: "2024-11-21T08:13:22.507", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-09-21T21:15:09.747", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://gist.github.com/bhyahoo/4772330b20057a271f77e690bc70f928", }, { source: "cve@mitre.org", tags: [ "Release Notes", ], url: "https://www.ivanti.com/releases", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://gist.github.com/bhyahoo/4772330b20057a271f77e690bc70f928", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://www.ivanti.com/releases", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-611", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-07-11 18:15
Modified
2024-11-21 04:19
Severity ?
Summary
An issue was discovered in the Core Server in Ivanti Endpoint Manager (EPM) 2017.3 before SU7 and 2018.x before 2018.3 SU3, with remote code execution. In other words, the issue affects 2017.3, 2018.1, and 2018.3 installations that lack the April 2019 update.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | 2017.3 | |
ivanti | endpoint_manager | 2018.1 | |
ivanti | endpoint_manager | 2018.3 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2017.3:*:*:*:*:*:*:*", matchCriteriaId: "0FA6FEF1-C2E1-438B-A2A4-C4210E6EB3C3", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2018.1:*:*:*:*:*:*:*", matchCriteriaId: "3383E032-650C-41A6-BF99-B68C5925FDC9", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2018.3:*:*:*:*:*:*:*", matchCriteriaId: "795C081F-B9DE-4775-A172-A3B344B1DE24", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An issue was discovered in the Core Server in Ivanti Endpoint Manager (EPM) 2017.3 before SU7 and 2018.x before 2018.3 SU3, with remote code execution. In other words, the issue affects 2017.3, 2018.1, and 2018.3 installations that lack the April 2019 update.", }, { lang: "es", value: "Se detectó un problema en el servidor Core en Ivanti Endpoint Manager (EPM) instalaciones 2017.3 anteriores a SU7 y instalaciones 2018.x anteriores a 2018.3 SU3, con ejecución de código remota. En otras palabras, el problema afecta a las instalaciones 2017.3, 2018.1 y 2018.3 que carecen de la actualización de abril de 2019.", }, ], id: "CVE-2019-10651", lastModified: "2024-11-21T04:19:40.520", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-07-11T18:15:12.417", references: [ { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Alert-Ivanti-Endpoint-Manager-April-2019", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Alert-Ivanti-Endpoint-Manager-April-2019", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-05-31 18:15
Modified
2024-11-21 09:08
Severity ?
Summary
An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F6549B-CF5D-4607-B67D-5489905A1705", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", matchCriteriaId: "1877FB55-76BA-4714-ABB8-47258132F537", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*", matchCriteriaId: "4F9E8D45-5F12-4D45-A74E-C314FA3618A3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code.", }, { lang: "es", value: "Una vulnerabilidad de inyección SQL no especificada en el servidor central de Ivanti EPM 2022 SU5 y anteriores permite que un atacante no autenticado dentro de la misma red ejecute código arbitrario.", }, ], id: "CVE-2024-29825", lastModified: "2024-11-21T09:08:24.907", metrics: { cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 9.6, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 6, source: "support@hackerone.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-05-31T18:15:11.443", references: [ { source: "support@hackerone.com", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", }, ], sourceIdentifier: "support@hackerone.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-89", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2024-05-31 18:15
Modified
2024-11-21 09:08
Severity ?
Summary
An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F6549B-CF5D-4607-B67D-5489905A1705", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", matchCriteriaId: "1877FB55-76BA-4714-ABB8-47258132F537", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*", matchCriteriaId: "4F9E8D45-5F12-4D45-A74E-C314FA3618A3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code. ", }, { lang: "es", value: "Una vulnerabilidad de inyección SQL no especificada en el servidor central de Ivanti EPM 2022 SU5 y anteriores permite que un atacante no autenticado dentro de la misma red ejecute código arbitrario.", }, ], id: "CVE-2024-29827", lastModified: "2024-11-21T09:08:25.183", metrics: { cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 9.6, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 6, source: "support@hackerone.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-05-31T18:15:11.780", references: [ { source: "support@hackerone.com", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", }, ], sourceIdentifier: "support@hackerone.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-89", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2024-05-31 18:15
Modified
2024-11-21 09:08
Severity ?
Summary
An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F6549B-CF5D-4607-B67D-5489905A1705", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", matchCriteriaId: "1877FB55-76BA-4714-ABB8-47258132F537", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*", matchCriteriaId: "4F9E8D45-5F12-4D45-A74E-C314FA3618A3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code. ", }, { lang: "es", value: "Una vulnerabilidad de inyección SQL no especificada en el servidor central de Ivanti EPM 2022 SU5 y anteriores permite que un atacante no autenticado dentro de la misma red ejecute código arbitrario.", }, ], id: "CVE-2024-29823", lastModified: "2024-11-21T09:08:24.637", metrics: { cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 9.6, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 6, source: "support@hackerone.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-05-31T18:15:11.017", references: [ { source: "support@hackerone.com", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", }, ], sourceIdentifier: "support@hackerone.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-89", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2024-05-31 18:15
Modified
2024-11-21 09:08
Severity ?
Summary
An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an authenticated attacker within the same network to execute arbitrary code.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F6549B-CF5D-4607-B67D-5489905A1705", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", matchCriteriaId: "1877FB55-76BA-4714-ABB8-47258132F537", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*", matchCriteriaId: "4F9E8D45-5F12-4D45-A74E-C314FA3618A3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an authenticated attacker within the same network to execute arbitrary code.", }, { lang: "es", value: "Una vulnerabilidad de inyección SQL no especificada en el servidor central de Ivanti EPM 2022 SU5 y anteriores permite que un atacante autenticado dentro de la misma red ejecute código arbitrario.", }, ], id: "CVE-2024-29846", lastModified: "2024-11-21T09:08:27.510", metrics: { cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 1.7, impactScore: 6, source: "support@hackerone.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.1, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-05-31T18:15:12.557", references: [ { source: "support@hackerone.com", tags: [ "Vendor Advisory", ], url: "https://www.ivanti.com/blog/topics/security-advisory", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.ivanti.com/blog/topics/security-advisory", }, ], sourceIdentifier: "support@hackerone.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-89", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2024-01-09 02:15
Modified
2024-11-21 08:15
Severity ?
Summary
An unspecified SQL Injection vulnerability in Ivanti Endpoint Manager released prior to 2022 SU 5 allows an attacker with access to the internal network to execute arbitrary SQL queries and retrieve output without the need for authentication. Under specific circumstances, this may also lead to RCE on the core server.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F6549B-CF5D-4607-B67D-5489905A1705", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", matchCriteriaId: "1877FB55-76BA-4714-ABB8-47258132F537", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An unspecified SQL Injection vulnerability in Ivanti Endpoint Manager released prior to 2022 SU 5 allows an attacker with access to the internal network to execute arbitrary SQL queries and retrieve output without the need for authentication. Under specific circumstances, this may also lead to RCE on the core server. ", }, { lang: "es", value: "Una vulnerabilidad de inyección SQL no especificada en Ivanti Endpoint Manager lanzada antes de 2022 SU 5 permite a un atacante con acceso a la red interna ejecutar consultas SQL arbitrarias y recuperar resultados sin necesidad de autenticación. En circunstancias específicas, esto también puede provocar RCE en el servidor central.", }, ], id: "CVE-2023-39336", lastModified: "2024-11-21T08:15:11.080", metrics: { cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 9.6, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 6, source: "support@hackerone.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-01-09T02:15:44.207", references: [ { source: "support@hackerone.com", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/SA-2023-12-19-CVE-2023-39336?language=en_US", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/SA-2023-12-19-CVE-2023-39336?language=en_US", }, ], sourceIdentifier: "support@hackerone.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-09-12 02:15
Modified
2024-09-12 22:35
Severity ?
Summary
An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2024 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F6549B-CF5D-4607-B67D-5489905A1705", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", matchCriteriaId: "1877FB55-76BA-4714-ABB8-47258132F537", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*", matchCriteriaId: "4F9E8D45-5F12-4D45-A74E-C314FA3618A3", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*", matchCriteriaId: "6C7283FE-C10A-4E37-B004-15FB0CAC49A5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.", }, { lang: "es", value: "Una inyección SQL no especificada en Ivanti EPM antes de 2022 SU6 o la actualización de septiembre de 2024 permite que un atacante autenticado remoto con privilegios de administrador logre la ejecución remota de código.", }, ], id: "CVE-2024-32845", lastModified: "2024-09-12T22:35:04.037", metrics: { cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.1, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.3, impactScore: 6, source: "support@hackerone.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-09-12T02:15:02.730", references: [ { source: "support@hackerone.com", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022", }, ], sourceIdentifier: "support@hackerone.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-89", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2024-11-12 16:15
Modified
2024-11-18 18:16
Severity ?
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
SQL injection in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a remote authenticated attacker with admin privileges to achieve remote code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2024 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F6549B-CF5D-4607-B67D-5489905A1705", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", matchCriteriaId: "1877FB55-76BA-4714-ABB8-47258132F537", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*", matchCriteriaId: "4F9E8D45-5F12-4D45-A74E-C314FA3618A3", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*", matchCriteriaId: "6C7283FE-C10A-4E37-B004-15FB0CAC49A5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "SQL injection in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a remote authenticated attacker with admin privileges to achieve remote code execution.", }, { lang: "es", value: "La inyección de SQL en Ivanti Endpoint Manager antes de la actualización de seguridad de noviembre de 2024 o la actualización de seguridad de noviembre de 2022 SU6 permite que un atacante remoto autenticado con privilegios de administrador logre la ejecución remota de código.", }, ], id: "CVE-2024-50327", lastModified: "2024-11-18T18:16:26.200", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.9, source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-11-12T16:15:25.023", references: [ { source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2024-for-EPM-2024-and-EPM-2022", }, ], sourceIdentifier: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-09-12 02:15
Modified
2024-09-12 22:35
Severity ?
Summary
An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2024 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F6549B-CF5D-4607-B67D-5489905A1705", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", matchCriteriaId: "1877FB55-76BA-4714-ABB8-47258132F537", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*", matchCriteriaId: "4F9E8D45-5F12-4D45-A74E-C314FA3618A3", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*", matchCriteriaId: "6C7283FE-C10A-4E37-B004-15FB0CAC49A5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.", }, { lang: "es", value: "Una inyección SQL no especificada en Ivanti EPM antes de 2022 SU6 o la actualización de septiembre de 2024 permite que un atacante autenticado remoto con privilegios de administrador logre la ejecución remota de código.", }, ], id: "CVE-2024-32846", lastModified: "2024-09-12T22:35:04.737", metrics: { cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.1, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.3, impactScore: 6, source: "support@hackerone.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-09-12T02:15:02.883", references: [ { source: "support@hackerone.com", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022", }, ], sourceIdentifier: "support@hackerone.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-89", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2024-11-12 16:15
Modified
2024-11-18 18:07
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Summary
Path traversal in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a remote unauthenticated attacker to achieve remote code execution. User interaction is required.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2024 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F6549B-CF5D-4607-B67D-5489905A1705", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", matchCriteriaId: "1877FB55-76BA-4714-ABB8-47258132F537", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*", matchCriteriaId: "4F9E8D45-5F12-4D45-A74E-C314FA3618A3", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*", matchCriteriaId: "6C7283FE-C10A-4E37-B004-15FB0CAC49A5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Path traversal in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a remote unauthenticated attacker to achieve remote code execution. User interaction is required.", }, { lang: "es", value: "El path traversal en Ivanti Endpoint Manager antes de la actualización de seguridad de noviembre de 2024 o la actualización de seguridad de noviembre de 2022 SU6 permite que un atacante remoto no autenticado logre la ejecución remota de código. Se requiere la interacción del usuario.", }, ], id: "CVE-2024-50329", lastModified: "2024-11-18T18:07:25.600", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-11-12T16:15:25.383", references: [ { source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2024-for-EPM-2024-and-EPM-2022", }, ], sourceIdentifier: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-22", }, ], source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-22", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-10-18 04:15
Modified
2024-11-21 08:07
Severity ?
Summary
Unsafe Deserialization of User Input could lead to Execution of Unauthorized Operations in Ivanti Endpoint Manager 2022 su3 and all previous versions, which could allow an attacker to execute commands remotely.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F6549B-CF5D-4607-B67D-5489905A1705", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Unsafe Deserialization of User Input could lead to Execution of Unauthorized Operations in Ivanti Endpoint Manager 2022 su3 and all previous versions, which could allow an attacker to execute commands remotely.", }, { lang: "es", value: "La Deserialización Insegura de la Entrada del Usuario podría provocar la ejecución de operaciones no autorizadas en Ivanti Endpoint Manager 2022 su3 y todas las versiones anteriores, lo que podría permitir a un atacante ejecutar comandos de forma remota.", }, ], id: "CVE-2023-35084", lastModified: "2024-11-21T08:07:56.673", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-10-18T04:15:11.027", references: [ { source: "support@hackerone.com", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/SA-2023-08-08-CVE-2023-35084?language=en_US", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/SA-2023-08-08-CVE-2023-35084?language=en_US", }, ], sourceIdentifier: "support@hackerone.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-502", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-11-12 16:15
Modified
2024-11-18 17:06
Severity ?
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
Path traversal in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a remote authenticated attacker with admin privileges to achieve remote code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2024 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F6549B-CF5D-4607-B67D-5489905A1705", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", matchCriteriaId: "1877FB55-76BA-4714-ABB8-47258132F537", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*", matchCriteriaId: "4F9E8D45-5F12-4D45-A74E-C314FA3618A3", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*", matchCriteriaId: "6C7283FE-C10A-4E37-B004-15FB0CAC49A5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Path traversal in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a remote authenticated attacker with admin privileges to achieve remote code execution.", }, { lang: "es", value: "El path traversal en Ivanti Endpoint Manager antes de la actualización de seguridad de noviembre de 2024 o la actualización de seguridad de noviembre de 2022 SU6 permite que un atacante remoto autenticado con privilegios de administrador logre la ejecución remota de código.", }, ], id: "CVE-2024-50324", lastModified: "2024-11-18T17:06:27.200", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.9, source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-11-12T16:15:24.653", references: [ { source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2024-for-EPM-2024-and-EPM-2022", }, ], sourceIdentifier: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-22", }, ], source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-22", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-11-12 18:15
Modified
2024-11-21 05:01
Severity ?
Summary
Several services are accessing named pipes in Ivanti Endpoint Manager through 2020.1.1 with default or overly permissive security attributes; as these services run as user ‘NT AUTHORITY\SYSTEM’, the issue can be used to escalate privileges from a local standard or service account having SeImpersonatePrivilege (eg. user ‘NT AUTHORITY\NETWORK SERVICE’).
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "462560FB-8D5E-4762-915E-D1E1DA692B7A", versionEndIncluding: "2020.1.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Several services are accessing named pipes in Ivanti Endpoint Manager through 2020.1.1 with default or overly permissive security attributes; as these services run as user ‘NT AUTHORITY\\SYSTEM’, the issue can be used to escalate privileges from a local standard or service account having SeImpersonatePrivilege (eg. user ‘NT AUTHORITY\\NETWORK SERVICE’).", }, { lang: "es", value: "Varios servicios están accediendo a canalizaciones nombradas en Ivanti Endpoint Manager versiones hasta 2020.1.1, con atributos de seguridad predeterminados o excesivamente permisivos; como estos servicios se ejecutan como usuario \"NT AUTHORITY\\SYSTEM\", el problema puede ser usado para escalar privilegios desde una cuenta de servicio o estándar local que tenga SeImpersonatePrivilege (por ejemplo, usuario \"NT AUTHORITY\\NETWORK SERVICE')", }, ], id: "CVE-2020-13770", lastModified: "2024-11-21T05:01:49.210", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-11-12T18:15:14.877", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://labs.jumpsec.com/advisory-cve-2020-13770-ivanti-uem-named-pipe-token-impersonation/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://labs.jumpsec.com/advisory-cve-2020-13770-ivanti-uem-named-pipe-token-impersonation/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-276", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-11-16 16:15
Modified
2024-11-21 05:01
Severity ?
Summary
In /ldclient/ldprov.cgi in Ivanti Endpoint Manager through 2020.1.1, an attacker is able to disclose information about the server operating system, local pathnames, and environment variables with no authentication required.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://forums.ivanti.com/s/ | Permissions Required, Vendor Advisory | |
cve@mitre.org | https://labs.jumpsec.com/cve-2020-13772-ivanti-uem-system-information-disclosure/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://forums.ivanti.com/s/ | Permissions Required, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://labs.jumpsec.com/cve-2020-13772-ivanti-uem-system-information-disclosure/ | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "462560FB-8D5E-4762-915E-D1E1DA692B7A", versionEndIncluding: "2020.1.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "In /ldclient/ldprov.cgi in Ivanti Endpoint Manager through 2020.1.1, an attacker is able to disclose information about the server operating system, local pathnames, and environment variables with no authentication required.", }, { lang: "es", value: "En el archivo /ldclient/ldprov.cgi en Ivanti Endpoint Manager versiones hasta 2020.1.1, un atacante puede divulgar información sobre el sistema operativo del servidor, unos nombres de ruta locales y unas variables de entorno sin necesidad de autenticación", }, ], id: "CVE-2020-13772", lastModified: "2024-11-21T05:01:49.517", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-11-16T16:15:14.133", references: [ { source: "cve@mitre.org", tags: [ "Permissions Required", "Vendor Advisory", ], url: "https://forums.ivanti.com/s/", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", ], url: "https://labs.jumpsec.com/cve-2020-13772-ivanti-uem-system-information-disclosure/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Permissions Required", "Vendor Advisory", ], url: "https://forums.ivanti.com/s/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://labs.jumpsec.com/cve-2020-13772-ivanti-uem-system-information-disclosure/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-09-10 21:15
Modified
2024-09-12 21:51
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Summary
Missing authentication in Network Isolation of Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote unauthenticated attacker to spoof Network Isolation status of managed devices.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2024 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F6549B-CF5D-4607-B67D-5489905A1705", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", matchCriteriaId: "1877FB55-76BA-4714-ABB8-47258132F537", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*", matchCriteriaId: "4F9E8D45-5F12-4D45-A74E-C314FA3618A3", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*", matchCriteriaId: "6C7283FE-C10A-4E37-B004-15FB0CAC49A5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Missing authentication in Network Isolation of Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote unauthenticated attacker to spoof Network Isolation status of managed devices.", }, { lang: "es", value: "La falta de autenticación en el aislamiento de red de Ivanti EPM antes de 2022 SU6 o la actualización de septiembre de 2024 permite que un atacante remoto no autenticado falsifique el estado de aislamiento de red de los dispositivos administrados.", }, ], id: "CVE-2024-8320", lastModified: "2024-09-12T21:51:58.960", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-09-10T21:15:15.060", references: [ { source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022", }, ], sourceIdentifier: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-306", }, ], source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-306", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-11-12 16:15
Modified
2024-11-18 16:30
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Summary
Path traversal in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a local unauthenticated attacker to achieve code execution. User interaction is required.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2024 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F6549B-CF5D-4607-B67D-5489905A1705", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", matchCriteriaId: "1877FB55-76BA-4714-ABB8-47258132F537", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*", matchCriteriaId: "4F9E8D45-5F12-4D45-A74E-C314FA3618A3", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*", matchCriteriaId: "6C7283FE-C10A-4E37-B004-15FB0CAC49A5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Path traversal in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a local unauthenticated attacker to achieve code execution. User interaction is required.", }, { lang: "es", value: "El path traversal en Ivanti Endpoint Manager antes de la actualización de seguridad de noviembre de 2024 o la actualización de seguridad de noviembre de 2022 SU6 permite que un atacante local no autenticado logre la ejecución del código. Se requiere la interacción del usuario.", }, ], id: "CVE-2024-50322", lastModified: "2024-11-18T16:30:49.997", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-11-12T16:15:24.280", references: [ { source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", tags: [ "Vendor Advisory", ], url: "https://https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2024-for-EPM-2024-and-EPM-2022", }, ], sourceIdentifier: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-22", }, ], source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-22", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-09-23 14:15
Modified
2024-11-21 07:02
Severity ?
Summary
The “LANDesk(R) Management Agent” service exposes a socket and once connected, it is possible to launch commands only for signed executables. This is a security bug that allows a limited user to get escalated admin privileges on their system.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2021.1.1 | |
ivanti | endpoint_manager | 2021.1.1 | |
ivanti | endpoint_manager | 2021.1.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "FC58DE72-F1ED-4578-B0C5-5A1441B80BDF", versionEndExcluding: "2021.1.1", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2021.1.1:-:*:*:*:*:*:*", matchCriteriaId: "A5A03343-47BC-4107-BCA0-1ECF1E7A2973", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2021.1.1:su1:*:*:*:*:*:*", matchCriteriaId: "0B0D55D6-0CEF-4BB7-AC52-F77BABD70FE1", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2021.1.1:su2:*:*:*:*:*:*", matchCriteriaId: "2CF5FA4D-A513-43D2-BBB8-462E6ECD310C", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The “LANDesk(R) Management Agent” service exposes a socket and once connected, it is possible to launch commands only for signed executables. This is a security bug that allows a limited user to get escalated admin privileges on their system.", }, { lang: "es", value: "El servicio \"LANDesk(R) Management Agent\" expone un socket y una vez conectado, es posible lanzar comandos sólo para los ejecutables firmados. Este es un bug de seguridad que permite a un usuario limitado conseguir privilegios de administrador escalados en su sistema.\n", }, ], id: "CVE-2022-30121", lastModified: "2024-11-21T07:02:12.060", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-09-23T14:15:12.273", references: [ { source: "support@hackerone.com", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-for-Ivanti-Endpoint-Manager-Client-CVE-2022-30121?language=en_US", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-for-Ivanti-Endpoint-Manager-Client-CVE-2022-30121?language=en_US", }, ], sourceIdentifier: "support@hackerone.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-09-12 02:15
Modified
2024-09-12 22:35
Severity ?
Summary
An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2024 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F6549B-CF5D-4607-B67D-5489905A1705", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", matchCriteriaId: "1877FB55-76BA-4714-ABB8-47258132F537", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*", matchCriteriaId: "4F9E8D45-5F12-4D45-A74E-C314FA3618A3", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*", matchCriteriaId: "6C7283FE-C10A-4E37-B004-15FB0CAC49A5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.", }, { lang: "es", value: "Una inyección SQL no especificada en Ivanti EPM antes de 2022 SU6 o la actualización de septiembre de 2024 permite que un atacante autenticado remoto con privilegios de administrador logre la ejecución remota de código.", }, ], id: "CVE-2024-32843", lastModified: "2024-09-12T22:35:03.333", metrics: { cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.1, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.3, impactScore: 6, source: "support@hackerone.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-09-12T02:15:02.567", references: [ { source: "support@hackerone.com", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022", }, ], sourceIdentifier: "support@hackerone.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-89", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2024-09-12 02:15
Modified
2024-09-12 22:35
Severity ?
Summary
An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2024 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F6549B-CF5D-4607-B67D-5489905A1705", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", matchCriteriaId: "1877FB55-76BA-4714-ABB8-47258132F537", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*", matchCriteriaId: "4F9E8D45-5F12-4D45-A74E-C314FA3618A3", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*", matchCriteriaId: "6C7283FE-C10A-4E37-B004-15FB0CAC49A5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.", }, { lang: "es", value: "Una inyección SQL no especificada en Ivanti EPM antes de 2022 SU6 o la actualización de septiembre de 2024 permite que un atacante autenticado remoto con privilegios de administrador logre la ejecución remota de código.", }, ], id: "CVE-2024-32848", lastModified: "2024-09-12T22:35:05.437", metrics: { cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.1, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.3, impactScore: 6, source: "support@hackerone.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-09-12T02:15:03.043", references: [ { source: "support@hackerone.com", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022", }, ], sourceIdentifier: "support@hackerone.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-89", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2024-09-12 02:15
Modified
2024-09-12 22:35
Severity ?
Summary
An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2024 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F6549B-CF5D-4607-B67D-5489905A1705", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", matchCriteriaId: "1877FB55-76BA-4714-ABB8-47258132F537", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*", matchCriteriaId: "4F9E8D45-5F12-4D45-A74E-C314FA3618A3", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*", matchCriteriaId: "6C7283FE-C10A-4E37-B004-15FB0CAC49A5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.", }, { lang: "es", value: "Una inyección SQL no especificada en Ivanti EPM antes de 2022 SU6 o la actualización de septiembre de 2024 permite que un atacante autenticado remoto con privilegios de administrador logre la ejecución remota de código.", }, ], id: "CVE-2024-34785", lastModified: "2024-09-12T22:35:07.533", metrics: { cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.1, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.3, impactScore: 6, source: "support@hackerone.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-09-12T02:15:03.540", references: [ { source: "support@hackerone.com", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022", }, ], sourceIdentifier: "support@hackerone.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-89", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2025-01-14 18:15
Modified
2025-03-13 15:28
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2024 |
{ cisaActionDue: "2025-03-31", cisaExploitAdd: "2025-03-10", cisaRequiredAction: "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", cisaVulnerabilityName: "Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability", configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:-:*:*:*:*:*:*", matchCriteriaId: "11BA6FEC-4862-4799-B8A1-9CEF9FE1B147", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", matchCriteriaId: "1877FB55-76BA-4714-ABB8-47258132F537", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*", matchCriteriaId: "4F9E8D45-5F12-4D45-A74E-C314FA3618A3", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su6:*:*:*:*:*:*", matchCriteriaId: "5BB1FEE4-8B72-42A4-A7E1-DB3B10CE5CEE", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*", matchCriteriaId: "6C7283FE-C10A-4E37-B004-15FB0CAC49A5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.", }, { lang: "es", value: "Absolute Path Traversal en Ivanti EPM antes de la actualización de seguridad de enero de 2024-2025 y la actualización de seguridad de enero de 2022 SU6 permite que un atacante remoto no autenticado filtre información confidencial.", }, ], id: "CVE-2024-13159", lastModified: "2025-03-13T15:28:42.627", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2025-01-14T18:15:26.243", references: [ { source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6", }, { source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", tags: [ "Exploit", "Third Party Advisory", ], url: "https://www.horizon3.ai/attack-research/attack-blogs/ivanti-endpoint-manager-multiple-credential-coercion-vulnerabilities/", }, ], sourceIdentifier: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-36", }, ], source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-11-12 16:15
Modified
2024-11-18 18:08
Severity ?
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
SQL injection in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a remote authenticated attacker with admin privileges to achieve remote code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2024 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F6549B-CF5D-4607-B67D-5489905A1705", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", matchCriteriaId: "1877FB55-76BA-4714-ABB8-47258132F537", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*", matchCriteriaId: "4F9E8D45-5F12-4D45-A74E-C314FA3618A3", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*", matchCriteriaId: "6C7283FE-C10A-4E37-B004-15FB0CAC49A5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "SQL injection in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a remote authenticated attacker with admin privileges to achieve remote code execution.", }, { lang: "es", value: "La inyección de SQL en Ivanti Endpoint Manager antes de la actualización de seguridad de noviembre de 2024 o la actualización de seguridad de noviembre de 2022 SU6 permite que un atacante remoto autenticado con privilegios de administrador logre la ejecución remota de código.", }, ], id: "CVE-2024-50328", lastModified: "2024-11-18T18:08:14.730", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.9, source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-11-12T16:15:25.207", references: [ { source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2024-for-EPM-2024-and-EPM-2022", }, ], sourceIdentifier: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-05-31 18:15
Modified
2024-11-21 09:08
Severity ?
Summary
An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an authenticated attacker within the same network to execute arbitrary code.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F6549B-CF5D-4607-B67D-5489905A1705", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", matchCriteriaId: "1877FB55-76BA-4714-ABB8-47258132F537", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*", matchCriteriaId: "4F9E8D45-5F12-4D45-A74E-C314FA3618A3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an authenticated attacker within the same network to execute arbitrary code.", }, { lang: "es", value: "Una vulnerabilidad de inyección SQL no especificada en el servidor central de Ivanti EPM 2022 SU5 y anteriores permite que un atacante autenticado dentro de la misma red ejecute código arbitrario.", }, ], id: "CVE-2024-29828", lastModified: "2024-11-21T09:08:25.327", metrics: { cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 1.7, impactScore: 6, source: "support@hackerone.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.1, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-05-31T18:15:11.947", references: [ { source: "support@hackerone.com", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", }, ], sourceIdentifier: "support@hackerone.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-89", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2024-09-10 21:15
Modified
2024-09-12 21:56
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Weak authentication in Patch Management of Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker to access restricted functionality.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2024 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F6549B-CF5D-4607-B67D-5489905A1705", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", matchCriteriaId: "1877FB55-76BA-4714-ABB8-47258132F537", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*", matchCriteriaId: "4F9E8D45-5F12-4D45-A74E-C314FA3618A3", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*", matchCriteriaId: "6C7283FE-C10A-4E37-B004-15FB0CAC49A5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Weak authentication in Patch Management of Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker to access restricted functionality.", }, { lang: "es", value: "La autenticación débil en la gestión de parches de Ivanti EPM antes de 2022 SU6 o la actualización de septiembre de 2024 permite que un atacante autenticado remoto acceda a una funcionalidad restringida.", }, ], id: "CVE-2024-8322", lastModified: "2024-09-12T21:56:43.673", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 1.4, source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-09-10T21:15:15.427", references: [ { source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022", }, ], sourceIdentifier: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-1390", }, ], source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-11-12 16:15
Modified
2024-11-18 16:32
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Summary
SQL injection in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a local unauthenticated attacker to achieve code execution. User interaction is required.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2024 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F6549B-CF5D-4607-B67D-5489905A1705", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", matchCriteriaId: "1877FB55-76BA-4714-ABB8-47258132F537", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*", matchCriteriaId: "4F9E8D45-5F12-4D45-A74E-C314FA3618A3", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*", matchCriteriaId: "6C7283FE-C10A-4E37-B004-15FB0CAC49A5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "SQL injection in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a local unauthenticated attacker to achieve code execution. User interaction is required.", }, { lang: "es", value: "La inyección SQL en Ivanti Endpoint Manager antes de la actualización de seguridad de noviembre de 2024 o la actualización de seguridad de noviembre de 2022 SU6 permite que un atacante local no autenticado ejecute código. Se requiere la interacción del usuario.", }, ], id: "CVE-2024-50323", lastModified: "2024-11-18T16:32:43.733", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-11-12T16:15:24.473", references: [ { source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2024-for-EPM-2024-and-EPM-2022", }, ], sourceIdentifier: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2025-01-14 18:15
Modified
2025-03-13 15:37
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2024 |
{ cisaActionDue: "2025-03-31", cisaExploitAdd: "2025-03-10", cisaRequiredAction: "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", cisaVulnerabilityName: "Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability", configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:-:*:*:*:*:*:*", matchCriteriaId: "11BA6FEC-4862-4799-B8A1-9CEF9FE1B147", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", matchCriteriaId: "1877FB55-76BA-4714-ABB8-47258132F537", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*", matchCriteriaId: "4F9E8D45-5F12-4D45-A74E-C314FA3618A3", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su6:*:*:*:*:*:*", matchCriteriaId: "5BB1FEE4-8B72-42A4-A7E1-DB3B10CE5CEE", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*", matchCriteriaId: "6C7283FE-C10A-4E37-B004-15FB0CAC49A5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.", }, { lang: "es", value: "Absolute Path Traversal en Ivanti EPM antes de la actualización de seguridad de enero de 2024-2025 y la actualización de seguridad de enero de 2022 SU6 permite que un atacante remoto no autenticado filtre información confidencial.", }, ], id: "CVE-2024-13161", lastModified: "2025-03-13T15:37:13.340", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2025-01-14T18:15:26.640", references: [ { source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6", }, { source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", tags: [ "Exploit", "Third Party Advisory", ], url: "https://www.horizon3.ai/attack-research/attack-blogs/ivanti-endpoint-manager-multiple-credential-coercion-vulnerabilities/", }, ], sourceIdentifier: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-36", }, ], source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-09-12 02:15
Modified
2024-09-12 22:35
Severity ?
Summary
An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2024 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F6549B-CF5D-4607-B67D-5489905A1705", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", matchCriteriaId: "1877FB55-76BA-4714-ABB8-47258132F537", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*", matchCriteriaId: "4F9E8D45-5F12-4D45-A74E-C314FA3618A3", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*", matchCriteriaId: "6C7283FE-C10A-4E37-B004-15FB0CAC49A5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.", }, { lang: "es", value: "Una inyección SQL no especificada en Ivanti EPM antes de 2022 SU6 o la actualización de septiembre de 2024 permite que un atacante autenticado remoto con privilegios de administrador logre la ejecución remota de código.", }, ], id: "CVE-2024-34783", lastModified: "2024-09-12T22:35:06.833", metrics: { cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.1, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.3, impactScore: 6, source: "support@hackerone.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-09-12T02:15:03.380", references: [ { source: "support@hackerone.com", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022", }, ], sourceIdentifier: "support@hackerone.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-89", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2020-11-16 16:15
Modified
2024-11-21 05:01
Severity ?
Summary
Ivanti Endpoint Manager through 2020.1.1 allows XSS via /LDMS/frm_splitfrm.aspx, /LDMS/licensecheck.aspx, /LDMS/frm_splitcollapse.aspx, /LDMS/alert_log.aspx, /LDMS/ServerList.aspx, /LDMS/frm_coremainfrm.aspx, /LDMS/frm_findfrm.aspx, /LDMS/frm_taskfrm.aspx, and /LDMS/query_browsecomp.aspx.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://forums.ivanti.com/s/ | Permissions Required, Vendor Advisory | |
cve@mitre.org | https://labs.jumpsec.com/cve-2020-13773-ivanti-uem-reflected-xss/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://forums.ivanti.com/s/ | Permissions Required, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://labs.jumpsec.com/cve-2020-13773-ivanti-uem-reflected-xss/ | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "462560FB-8D5E-4762-915E-D1E1DA692B7A", versionEndIncluding: "2020.1.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Ivanti Endpoint Manager through 2020.1.1 allows XSS via /LDMS/frm_splitfrm.aspx, /LDMS/licensecheck.aspx, /LDMS/frm_splitcollapse.aspx, /LDMS/alert_log.aspx, /LDMS/ServerList.aspx, /LDMS/frm_coremainfrm.aspx, /LDMS/frm_findfrm.aspx, /LDMS/frm_taskfrm.aspx, and /LDMS/query_browsecomp.aspx.", }, { lang: "es", value: "Ivanti Endpoint Manager versiones hasta 2020.1.1, permite un ataque de tipo XSS por medio de los archivos /LDMS/frm_splitfrm.aspx, /LDMS/licensecheck.aspx, /LDMS/frm_splitcollapse.aspx, /LDMS/alert_log.aspx, /LDMS/ServerList.aspx, /LDMS /frm_coremainfrm. aspx, /LDMS/frm_findfrm.aspx, /LDMS/frm_taskfrm.aspx y /LDMS/query_browsecomp.aspx", }, ], id: "CVE-2020-13773", lastModified: "2024-11-21T05:01:49.673", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 3.5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:S/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 6.8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.3, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-11-16T16:15:14.197", references: [ { source: "cve@mitre.org", tags: [ "Permissions Required", "Vendor Advisory", ], url: "https://forums.ivanti.com/s/", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", ], url: "https://labs.jumpsec.com/cve-2020-13773-ivanti-uem-reflected-xss/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Permissions Required", "Vendor Advisory", ], url: "https://forums.ivanti.com/s/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://labs.jumpsec.com/cve-2020-13773-ivanti-uem-reflected-xss/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-12-05 22:15
Modified
2024-11-21 07:10
Severity ?
Summary
XML Injection with Endpoint Manager 2022. 3 and below causing a download of a malicious file to run and possibly execute to gain unauthorized privileges.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "8E62C8EE-6A01-4308-A38B-8C8F33D98F28", versionEndIncluding: "2022.3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "XML Injection with Endpoint Manager 2022. 3 and below causing a download of a malicious file to run and possibly execute to gain unauthorized privileges.", }, { lang: "es", value: "La inyección XML con Endpoint Manager 2022. 3 y versiones anteriores provoca que se ejecute la descarga de un archivo malicioso y posiblemente se ejecute para obtener privilegios no autorizados.", }, ], id: "CVE-2022-35259", lastModified: "2024-11-21T07:10:59.453", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-12-05T22:15:10.683", references: [ { source: "support@hackerone.com", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-for-Ivanti-Endpoint-Manager-Client-CVE-2022-35259?language=en_US", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-for-Ivanti-Endpoint-Manager-Client-CVE-2022-35259?language=en_US", }, ], sourceIdentifier: "support@hackerone.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-91", }, ], source: "support@hackerone.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-91", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-05-31 18:15
Modified
2024-11-21 09:08
Severity ?
Summary
An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F6549B-CF5D-4607-B67D-5489905A1705", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", matchCriteriaId: "1877FB55-76BA-4714-ABB8-47258132F537", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*", matchCriteriaId: "4F9E8D45-5F12-4D45-A74E-C314FA3618A3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code. ", }, { lang: "es", value: "Una vulnerabilidad de inyección SQL no especificada en el servidor central de Ivanti EPM 2022 SU5 y anteriores permite que un atacante no autenticado dentro de la misma red ejecute código arbitrario.", }, ], id: "CVE-2024-29822", lastModified: "2024-11-21T09:08:24.487", metrics: { cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 9.6, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 6, source: "support@hackerone.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-05-31T18:15:10.837", references: [ { source: "support@hackerone.com", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", }, ], sourceIdentifier: "support@hackerone.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-89", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2020-11-12 20:15
Modified
2024-11-21 05:01
Severity ?
Summary
An unrestricted file-upload issue in EditLaunchPadDialog.aspx in Ivanti Endpoint Manager 2019.1 and 2020.1 allows an authenticated attacker to gain remote code execution by uploading a malicious aspx file. The issue is caused by insufficient file extension validation and insecure file operations on the uploaded image, which upon failure will leave the temporarily created files in an accessible location on the server.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://labs.jumpsec.com/advisory-cve-2020-13774-ivanti-uem-rce/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://labs.jumpsec.com/advisory-cve-2020-13774-ivanti-uem-rce/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | 2019.1 | |
ivanti | endpoint_manager | 2020.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2019.1:*:*:*:*:*:*:*", matchCriteriaId: "4BD9E4D7-899F-4CA4-A252-215F21DE7919", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2020.1:*:*:*:*:*:*:*", matchCriteriaId: "B466D6DA-27D7-47F6-A97B-5E39DD385DB8", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An unrestricted file-upload issue in EditLaunchPadDialog.aspx in Ivanti Endpoint Manager 2019.1 and 2020.1 allows an authenticated attacker to gain remote code execution by uploading a malicious aspx file. The issue is caused by insufficient file extension validation and insecure file operations on the uploaded image, which upon failure will leave the temporarily created files in an accessible location on the server.", }, { lang: "es", value: "Un problema de carga de archivos sin restricciones en el archivo EditLaunchPadDialog.aspx en Ivanti Endpoint Manager versiones 2019.1 y 2020.1, permite a un atacante autenticado conseguir una ejecución de código remota cargando un archivo aspx malicioso. El problema es causado por una validación de extensión de archivo insuficiente y operaciones de archivo no seguras en la imagen cargada, que tras el fallo dejarán los archivos creados temporalmente en una ubicación accesible en el servidor", }, ], id: "CVE-2020-13774", lastModified: "2024-11-21T05:01:49.847", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.9, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.1, impactScore: 6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-11-12T20:15:16.017", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://labs.jumpsec.com/advisory-cve-2020-13774-ivanti-uem-rce/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://labs.jumpsec.com/advisory-cve-2020-13774-ivanti-uem-rce/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-434", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-09-12 02:15
Modified
2024-09-12 22:35
Severity ?
Summary
Deserialization of untrusted data in the agent portal of Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote unauthenticated attacker to achieve remote code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2024 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F6549B-CF5D-4607-B67D-5489905A1705", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", matchCriteriaId: "1877FB55-76BA-4714-ABB8-47258132F537", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*", matchCriteriaId: "4F9E8D45-5F12-4D45-A74E-C314FA3618A3", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*", matchCriteriaId: "6C7283FE-C10A-4E37-B004-15FB0CAC49A5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Deserialization of untrusted data in the agent portal of Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote unauthenticated attacker to achieve remote code execution.", }, { lang: "es", value: "La deserialización de datos no confiables en el portal del agente de Ivanti EPM antes de 2022 SU6 o la actualización de septiembre de 2024 permite que un atacante remoto no autenticado logre la ejecución remota de código.", }, ], id: "CVE-2024-29847", lastModified: "2024-09-12T22:35:00.440", metrics: { cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 10, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 6, source: "support@hackerone.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-09-12T02:15:02.077", references: [ { source: "support@hackerone.com", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022", }, ], sourceIdentifier: "support@hackerone.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-502", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-502", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2024-05-31 18:15
Modified
2024-11-21 09:08
Severity ?
Summary
An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an authenticated attacker within the same network to execute arbitrary code.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F6549B-CF5D-4607-B67D-5489905A1705", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", matchCriteriaId: "1877FB55-76BA-4714-ABB8-47258132F537", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*", matchCriteriaId: "4F9E8D45-5F12-4D45-A74E-C314FA3618A3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an authenticated attacker within the same network to execute arbitrary code.", }, { lang: "es", value: "Una vulnerabilidad de inyección SQL no especificada en el servidor central de Ivanti EPM 2022 SU5 y anteriores permite que un atacante autenticado dentro de la misma red ejecute código arbitrario.", }, ], id: "CVE-2024-29829", lastModified: "2024-11-21T09:08:25.467", metrics: { cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 1.7, impactScore: 6, source: "support@hackerone.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.1, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-05-31T18:15:12.107", references: [ { source: "support@hackerone.com", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", }, ], sourceIdentifier: "support@hackerone.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-89", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2023-09-21 21:15
Modified
2024-11-21 08:13
Severity ?
Summary
An issue was discovered in Ivanti Endpoint Manager before 2022 SU4. A file disclosure vulnerability exists in the GetFileContents SOAP action exposed via /landesk/managementsuite/core/core.secure/OsdScript.asmx. The application does not sufficiently restrict user-supplied paths, allowing for an authenticated attacker to read arbitrary files from a remote system, including the private key used to authenticate to agents for remote access.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://gist.github.com/bhyahoo/76533e91840200a1d9f3fb1eb87eb0f1 | Third Party Advisory | |
cve@mitre.org | https://www.ivanti.com/releases | Release Notes | |
af854a3a-2127-422b-91ae-364da2661108 | https://gist.github.com/bhyahoo/76533e91840200a1d9f3fb1eb87eb0f1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.ivanti.com/releases | Release Notes |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F6549B-CF5D-4607-B67D-5489905A1705", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An issue was discovered in Ivanti Endpoint Manager before 2022 SU4. A file disclosure vulnerability exists in the GetFileContents SOAP action exposed via /landesk/managementsuite/core/core.secure/OsdScript.asmx. The application does not sufficiently restrict user-supplied paths, allowing for an authenticated attacker to read arbitrary files from a remote system, including the private key used to authenticate to agents for remote access.", }, { lang: "es", value: "Se descubrió un problema en Ivanti Endpoint Manager antes de 2022 SU4. Existe una vulnerabilidad de divulgación de archivos en la acción SOAP GetFileContents expuesta a través de /landesk/managementsuite/core/core.secure/OsdScript.asmx. La aplicación no restringe suficientemente las rutas proporcionadas por el usuario, lo que permite que un atacante autenticado lea archivos arbitrarios desde un sistema remoto, incluida la clave privada utilizada para autenticarse ante agentes para acceso remoto.", }, ], id: "CVE-2023-38344", lastModified: "2024-11-21T08:13:22.673", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-09-21T21:15:10.877", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://gist.github.com/bhyahoo/76533e91840200a1d9f3fb1eb87eb0f1", }, { source: "cve@mitre.org", tags: [ "Release Notes", ], url: "https://www.ivanti.com/releases", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://gist.github.com/bhyahoo/76533e91840200a1d9f3fb1eb87eb0f1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://www.ivanti.com/releases", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-200", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2024-11-12 16:15
Modified
2024-11-18 18:15
Severity ?
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
SQL injection in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a remote authenticated attacker with admin privileges to achieve remote code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2024 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F6549B-CF5D-4607-B67D-5489905A1705", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", matchCriteriaId: "1877FB55-76BA-4714-ABB8-47258132F537", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*", matchCriteriaId: "4F9E8D45-5F12-4D45-A74E-C314FA3618A3", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*", matchCriteriaId: "6C7283FE-C10A-4E37-B004-15FB0CAC49A5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "SQL injection in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a remote authenticated attacker with admin privileges to achieve remote code execution.", }, { lang: "es", value: "La inyección de SQL en Ivanti Endpoint Manager antes de la actualización de seguridad de noviembre de 2024 o la actualización de seguridad de noviembre de 2022 SU6 permite que un atacante remoto autenticado con privilegios de administrador logre la ejecución remota de código.", }, ], id: "CVE-2024-50326", lastModified: "2024-11-18T18:15:52.253", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.9, source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-11-12T16:15:24.840", references: [ { source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2024-for-EPM-2024-and-EPM-2022", }, ], sourceIdentifier: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-09-12 02:15
Modified
2024-09-12 22:35
Severity ?
Summary
An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2024 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F6549B-CF5D-4607-B67D-5489905A1705", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", matchCriteriaId: "1877FB55-76BA-4714-ABB8-47258132F537", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*", matchCriteriaId: "4F9E8D45-5F12-4D45-A74E-C314FA3618A3", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*", matchCriteriaId: "6C7283FE-C10A-4E37-B004-15FB0CAC49A5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.", }, { lang: "es", value: "Una inyección SQL no especificada en Ivanti EPM antes de 2022 SU6 o la actualización de septiembre de 2024 permite que un atacante autenticado remoto con privilegios de administrador logre la ejecución remota de código.", }, ], id: "CVE-2024-32842", lastModified: "2024-09-12T22:35:02.527", metrics: { cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.1, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.3, impactScore: 6, source: "support@hackerone.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-09-12T02:15:02.417", references: [ { source: "support@hackerone.com", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022", }, ], sourceIdentifier: "support@hackerone.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-89", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2024-09-10 21:15
Modified
2024-09-12 21:53
Severity ?
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
An uncontrolled search path in the agent of Ivanti EPM before 2022 SU6, or the 2024 September update allows a local authenticated attacker with admin privileges to escalate their privileges to SYSTEM.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2024 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F6549B-CF5D-4607-B67D-5489905A1705", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", matchCriteriaId: "1877FB55-76BA-4714-ABB8-47258132F537", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*", matchCriteriaId: "4F9E8D45-5F12-4D45-A74E-C314FA3618A3", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*", matchCriteriaId: "6C7283FE-C10A-4E37-B004-15FB0CAC49A5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An uncontrolled search path in the agent of Ivanti EPM before 2022 SU6, or the 2024 September update allows a local authenticated attacker with admin privileges to escalate their privileges to SYSTEM.", }, { lang: "es", value: "Una ruta de búsqueda no controlada en el agente de Ivanti EPM antes de 2022 SU6 o la actualización de septiembre de 2024 permite que un atacante autenticado local con privilegios de administrador escale sus permisos a SYSTEM.", }, ], id: "CVE-2024-8441", lastModified: "2024-09-12T21:53:43.387", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 5.9, source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-09-10T21:15:15.613", references: [ { source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022", }, ], sourceIdentifier: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-427", }, ], source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-427", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-05-31 18:15
Modified
2024-11-21 09:08
Severity ?
Summary
An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F6549B-CF5D-4607-B67D-5489905A1705", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", matchCriteriaId: "1877FB55-76BA-4714-ABB8-47258132F537", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*", matchCriteriaId: "4F9E8D45-5F12-4D45-A74E-C314FA3618A3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code.", }, { lang: "es", value: "Una vulnerabilidad de inyección SQL no especificada en el servidor central de Ivanti EPM 2022 SU5 y anteriores permite que un atacante no autenticado dentro de la misma red ejecute código arbitrario.", }, ], id: "CVE-2024-29826", lastModified: "2024-11-21T09:08:25.050", metrics: { cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 9.6, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 6, source: "support@hackerone.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-05-31T18:15:11.617", references: [ { source: "support@hackerone.com", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", }, ], sourceIdentifier: "support@hackerone.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-89", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2022-12-05 22:15
Modified
2024-11-21 06:56
Severity ?
Summary
A privilege escalation vulnerability is identified in Ivanti EPM (LANDesk Management Suite) that allows a user to execute commands with elevated privileges.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2021.1 | |
ivanti | endpoint_manager | 2021.1 | |
ivanti | endpoint_manager | 2022 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "5A453106-D60D-47B5-BCF6-C3EAE7C7F5FC", versionEndExcluding: "2021.1", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2021.1:su1:*:*:*:*:*:*", matchCriteriaId: "A7AF4652-65B3-45A1-AC59-4D510F9F3CFB", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2021.1:su2:*:*:*:*:*:*", matchCriteriaId: "FDE562CC-1046-487C-A63E-9F506959A974", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A privilege escalation vulnerability is identified in Ivanti EPM (LANDesk Management Suite) that allows a user to execute commands with elevated privileges.", }, { lang: "es", value: "Se identifica una vulnerabilidad de escalada de privilegios en Ivanti EPM (LANDesk Management Suite) que permite a un usuario ejecutar comandos con privilegios elevados.", }, ], id: "CVE-2022-27773", lastModified: "2024-11-21T06:56:09.577", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-12-05T22:15:10.113", references: [ { source: "support@hackerone.com", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-for-Ivanti-Endpoint-Manager-Client-CVE-2022-27773?language=en_US", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-for-Ivanti-Endpoint-Manager-Client-CVE-2022-27773?language=en_US", }, ], sourceIdentifier: "support@hackerone.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-07-21 21:15
Modified
2024-11-21 08:07
Severity ?
Summary
An out-of-bounds write vulnerability on windows operating systems causes the Ivanti AntiVirus Product to crash. Update to Ivanti AV Product version 7.9.1.285 or above.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
microsoft | windows | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "2AA8C7A8-3B85-406F-A240-BCDE37C5242C", versionEndExcluding: "7.9.1.285", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "An out-of-bounds write vulnerability on windows operating systems causes the Ivanti AntiVirus Product to crash. Update to Ivanti AV Product version 7.9.1.285 or above.", }, ], id: "CVE-2023-35077", lastModified: "2024-11-21T08:07:55.893", metrics: { cvssMetricV30: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.2, impactScore: 5.9, source: "support@hackerone.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-07-21T21:15:11.337", references: [ { source: "support@hackerone.com", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/SA-2023-07-19-CVE-2023-35077", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/SA-2023-07-19-CVE-2023-35077", }, ], sourceIdentifier: "support@hackerone.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-07-01 00:15
Modified
2024-11-21 07:54
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.2 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
8.2 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
Summary
A improper input validation vulnerability exists in Ivanti Endpoint Manager 2022 and below that could allow privilege escalation or remote code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "372561DA-DEAF-47DA-99B3-8BBBDADFD91A", versionEndIncluding: "2022", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A improper input validation vulnerability exists in Ivanti Endpoint Manager 2022 and below that could allow privilege escalation or remote code execution.", }, ], id: "CVE-2023-28324", lastModified: "2024-11-21T07:54:50.630", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.5, impactScore: 6, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2023-07-01T00:15:10.103", references: [ { source: "support@hackerone.com", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/SA-2023-06-06-CVE-2023-28324", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/SA-2023-06-06-CVE-2023-28324", }, ], sourceIdentifier: "support@hackerone.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-20", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2024-05-31 18:15
Modified
2024-11-29 16:45
Severity ?
Summary
An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 |
{ cisaActionDue: "2024-10-23", cisaExploitAdd: "2024-10-02", cisaRequiredAction: "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", cisaVulnerabilityName: "Ivanti Endpoint Manager (EPM) SQL Injection Vulnerability", configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F6549B-CF5D-4607-B67D-5489905A1705", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", matchCriteriaId: "1877FB55-76BA-4714-ABB8-47258132F537", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*", matchCriteriaId: "4F9E8D45-5F12-4D45-A74E-C314FA3618A3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code.", }, { lang: "es", value: "Una vulnerabilidad de inyección SQL no especificada en el servidor central de Ivanti EPM 2022 SU5 y anteriores permite que un atacante no autenticado dentro de la misma red ejecute código arbitrario.", }, ], id: "CVE-2024-29824", lastModified: "2024-11-29T16:45:04.187", metrics: { cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 9.6, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 6, source: "support@hackerone.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-05-31T18:15:11.177", references: [ { source: "support@hackerone.com", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", }, ], sourceIdentifier: "support@hackerone.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-89", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2020-11-16 16:15
Modified
2024-11-21 05:01
Severity ?
Summary
LDMS/alert_log.aspx in Ivanti Endpoint Manager through 2020.1 allows SQL Injection via a /remotecontrolauth/api/device request.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://forums.ivanti.com/s/ | Permissions Required, Vendor Advisory | |
cve@mitre.org | https://labs.jumpsec.com/advisory-cve-2020-13769-ivanti-uem-sql-injection/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://forums.ivanti.com/s/ | Permissions Required, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://labs.jumpsec.com/advisory-cve-2020-13769-ivanti-uem-sql-injection/ | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "8A1DC8D1-0159-4FC9-9A69-C48E646774B6", versionEndIncluding: "2020.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "LDMS/alert_log.aspx in Ivanti Endpoint Manager through 2020.1 allows SQL Injection via a /remotecontrolauth/api/device request.", }, { lang: "es", value: "El archivo LDMS/alert_log.aspx en Ivanti Endpoint Manager versiones hasta 2020.1, permite una inyección SQL por medio de una petición de /remotecontrolauth/api/device", }, ], id: "CVE-2020-13769", lastModified: "2024-11-21T05:01:49.057", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "PARTIAL", baseScore: 6.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-11-16T16:15:14.070", references: [ { source: "cve@mitre.org", tags: [ "Permissions Required", "Vendor Advisory", ], url: "https://forums.ivanti.com/s/", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", ], url: "https://labs.jumpsec.com/advisory-cve-2020-13769-ivanti-uem-sql-injection/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Permissions Required", "Vendor Advisory", ], url: "https://forums.ivanti.com/s/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://labs.jumpsec.com/advisory-cve-2020-13769-ivanti-uem-sql-injection/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-07-01 00:15
Modified
2024-11-21 07:54
Severity ?
Summary
A deserialization of untrusted data exists in EPM 2022 Su3 and all prior versions that allows an unauthenticated user to elevate rights. This exploit could potentially be used in conjunction with other OS (Operating System) vulnerabilities to escalate privileges on the machine or be used as a stepping stone to get to other network attached machines.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F6549B-CF5D-4607-B67D-5489905A1705", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A deserialization of untrusted data exists in EPM 2022 Su3 and all prior versions that allows an unauthenticated user to elevate rights. This exploit could potentially be used in conjunction with other OS (Operating System) vulnerabilities to escalate privileges on the machine or be used as a stepping stone to get to other network attached machines.\r\n", }, ], id: "CVE-2023-28323", lastModified: "2024-11-21T07:54:50.513", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-07-01T00:15:10.057", references: [ { source: "support@hackerone.com", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/SA-2023-06-20-CVE-2023-28323", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/SA-2023-06-20-CVE-2023-28323", }, ], sourceIdentifier: "support@hackerone.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-502", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-12-11 06:29
Modified
2024-11-21 03:07
Severity ?
Summary
In Ivanti Service Desk (formerly LANDESK Management Suite) versions between 2016.3 and 2017.3, an Unrestricted Direct Object Reference leads to referencing/updating objects belonging to other users. In other words, a normal user can send requests to a specific URI with the target user's username in an HTTP payload in order to retrieve a key/token and use it to access/update objects belonging to other users. Such objects could be user profiles, tickets, incidents, etc.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://community.ivanti.com/docs/DOC-66252 | ||
cve@mitre.org | https://gist.github.com/lazyhack3r/439e92419c552b5dc82b2f5e832c8bfb | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://community.ivanti.com/docs/DOC-66252 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://gist.github.com/lazyhack3r/439e92419c552b5dc82b2f5e832c8bfb | Issue Tracking, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | 2016.4 | |
ivanti | endpoint_manager | 2017.1 | |
ivanti | endpoint_manager | 2017.3 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2016.4:*:*:*:*:*:*:*", matchCriteriaId: "E0B26FE2-0C8A-4C51-81CC-90A9C128B0E6", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2017.1:*:*:*:*:*:*:*", matchCriteriaId: "41392D7B-D79D-4682-B8D8-0B770FE1C3EF", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2017.3:*:*:*:*:*:*:*", matchCriteriaId: "0FA6FEF1-C2E1-438B-A2A4-C4210E6EB3C3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "In Ivanti Service Desk (formerly LANDESK Management Suite) versions between 2016.3 and 2017.3, an Unrestricted Direct Object Reference leads to referencing/updating objects belonging to other users. In other words, a normal user can send requests to a specific URI with the target user's username in an HTTP payload in order to retrieve a key/token and use it to access/update objects belonging to other users. Such objects could be user profiles, tickets, incidents, etc.", }, { lang: "es", value: "En Ivanti Service Desk (anteriormente LANDESK Management Suite) entre las versiones 2016.3 y 2017.3, una referencia directa a objetos no restringida conduce a la referencia/actualización de objetos que pertenecen a otros usuarios. En otras palabras, un usuario normal puede enviar peticiones a un URI específico con el nombre de usuario del usuario objetivo en una carga útil HTTP para recuperar una clave/token y emplearla para acceder/actualizar objetos pertenecientes a otros usuarios. Dichos objetos podrían ser perfiles, tickets, incidentes, etc.", }, ], id: "CVE-2017-11463", lastModified: "2024-11-21T03:07:50.100", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "PARTIAL", baseScore: 6.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-12-11T06:29:00.223", references: [ { source: "cve@mitre.org", url: "https://community.ivanti.com/docs/DOC-66252", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://gist.github.com/lazyhack3r/439e92419c552b5dc82b2f5e832c8bfb", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://community.ivanti.com/docs/DOC-66252", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://gist.github.com/lazyhack3r/439e92419c552b5dc82b2f5e832c8bfb", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-275", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-11-12 18:15
Modified
2024-11-21 05:01
Severity ?
Summary
Various components in Ivanti Endpoint Manager through 2020.1.1 rely on Windows search order when loading a (nonexistent) library file, allowing (under certain conditions) one to gain code execution (and elevation of privileges to the level of privilege held by the vulnerable component such as NT AUTHORITY\SYSTEM) via DLL hijacking. This affects ldiscn32.exe, IpmiRedirectionService.exe, LDAPWhoAmI.exe, and ldprofile.exe.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://labs.jumpsec.com/advisory-cve-2020-13771-ivanti-uem-dll-hijacking/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://labs.jumpsec.com/advisory-cve-2020-13771-ivanti-uem-dll-hijacking/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "462560FB-8D5E-4762-915E-D1E1DA692B7A", versionEndIncluding: "2020.1.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Various components in Ivanti Endpoint Manager through 2020.1.1 rely on Windows search order when loading a (nonexistent) library file, allowing (under certain conditions) one to gain code execution (and elevation of privileges to the level of privilege held by the vulnerable component such as NT AUTHORITY\\SYSTEM) via DLL hijacking. This affects ldiscn32.exe, IpmiRedirectionService.exe, LDAPWhoAmI.exe, and ldprofile.exe.", }, { lang: "es", value: "Varios componentes en Ivanti Endpoint Manager versiones hasta 2020.1.1, se basan en el orden de búsqueda de Windows al cargar un archivo de biblioteca (inexistente), permitiendo (bajo determinadas condiciones) que uno consiga una ejecución de código (y una elevación de privilegios al nivel de privilegio que posee el componente vulnerable) tal y como NT AUTHORITY\\SYSTEM) por medio el secuestro de una DLL. Esto afecta a los archivos ldiscn32.exe, IpmiRedirectionService.exe, LDAPWhoAmI.exe y ldprofile.exe", }, ], id: "CVE-2020-13771", lastModified: "2024-11-21T05:01:49.360", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 6.9, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:M/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.4, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-11-12T18:15:14.940", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://labs.jumpsec.com/advisory-cve-2020-13771-ivanti-uem-dll-hijacking/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://labs.jumpsec.com/advisory-cve-2020-13771-ivanti-uem-dll-hijacking/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-427", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-09-10 21:15
Modified
2024-09-12 21:50
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
SQL injection in the management console of Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote unauthenticated attacker to achieve remote code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2024 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F6549B-CF5D-4607-B67D-5489905A1705", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", matchCriteriaId: "1877FB55-76BA-4714-ABB8-47258132F537", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*", matchCriteriaId: "4F9E8D45-5F12-4D45-A74E-C314FA3618A3", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*", matchCriteriaId: "6C7283FE-C10A-4E37-B004-15FB0CAC49A5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "SQL injection in the management console of Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote unauthenticated attacker to achieve remote code execution.", }, { lang: "es", value: "La inyección de SQL en la consola de administración de Ivanti EPM antes de 2022 SU6, o la actualización de septiembre de 2024, permite que un atacante remoto no autenticado logre la ejecución remota de código.", }, ], id: "CVE-2024-8191", lastModified: "2024-09-12T21:50:39.507", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-09-10T21:15:14.880", references: [ { source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022", }, ], sourceIdentifier: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-05-31 18:15
Modified
2024-11-21 09:08
Severity ?
Summary
An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an authenticated attacker within the same network to execute arbitrary code.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F6549B-CF5D-4607-B67D-5489905A1705", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", matchCriteriaId: "1877FB55-76BA-4714-ABB8-47258132F537", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*", matchCriteriaId: "4F9E8D45-5F12-4D45-A74E-C314FA3618A3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an authenticated attacker within the same network to execute arbitrary code.", }, { lang: "es", value: "Una vulnerabilidad de inyección SQL no especificada en el servidor central de Ivanti EPM 2022 SU5 y anteriores permite que un atacante autenticado dentro de la misma red ejecute código arbitrario.", }, ], id: "CVE-2024-29830", lastModified: "2024-11-21T09:08:25.620", metrics: { cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 1.7, impactScore: 6, source: "support@hackerone.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.1, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-05-31T18:15:12.390", references: [ { source: "support@hackerone.com", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", }, ], sourceIdentifier: "support@hackerone.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-89", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2024-09-12 02:15
Modified
2024-09-12 22:35
Severity ?
Summary
An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2024 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F6549B-CF5D-4607-B67D-5489905A1705", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", matchCriteriaId: "1877FB55-76BA-4714-ABB8-47258132F537", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*", matchCriteriaId: "4F9E8D45-5F12-4D45-A74E-C314FA3618A3", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*", matchCriteriaId: "6C7283FE-C10A-4E37-B004-15FB0CAC49A5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.", }, { lang: "es", value: "Una inyección SQL no especificada en Ivanti EPM antes de 2022 SU6 o la actualización de septiembre de 2024 permite que un atacante autenticado remoto con privilegios de administrador logre la ejecución remota de código.", }, ], id: "CVE-2024-34779", lastModified: "2024-09-12T22:35:06.133", metrics: { cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.1, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.3, impactScore: 6, source: "support@hackerone.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-09-12T02:15:03.207", references: [ { source: "support@hackerone.com", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022", }, ], sourceIdentifier: "support@hackerone.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-89", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2025-01-14 18:15
Modified
2025-03-13 15:30
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2024 |
{ cisaActionDue: "2025-03-31", cisaExploitAdd: "2025-03-10", cisaRequiredAction: "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", cisaVulnerabilityName: "Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability", configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:-:*:*:*:*:*:*", matchCriteriaId: "11BA6FEC-4862-4799-B8A1-9CEF9FE1B147", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", matchCriteriaId: "1877FB55-76BA-4714-ABB8-47258132F537", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*", matchCriteriaId: "4F9E8D45-5F12-4D45-A74E-C314FA3618A3", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su6:*:*:*:*:*:*", matchCriteriaId: "5BB1FEE4-8B72-42A4-A7E1-DB3B10CE5CEE", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*", matchCriteriaId: "6C7283FE-C10A-4E37-B004-15FB0CAC49A5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.", }, { lang: "es", value: "Absolute Path Traversal en Ivanti EPM antes de la actualización de seguridad de enero de 2024-2025 y la actualización de seguridad de enero de 2022 SU6 permite que un atacante remoto no autenticado filtre información confidencial.", }, ], id: "CVE-2024-13160", lastModified: "2025-03-13T15:30:35.020", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2025-01-14T18:15:26.447", references: [ { source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6", }, { source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", tags: [ "Exploit", "Third Party Advisory", ], url: "https://www.horizon3.ai/attack-research/attack-blogs/ivanti-endpoint-manager-multiple-credential-coercion-vulnerabilities/", }, ], sourceIdentifier: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-36", }, ], source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-09-12 02:15
Modified
2024-09-12 22:35
Severity ?
Summary
An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2024 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F6549B-CF5D-4607-B67D-5489905A1705", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", matchCriteriaId: "1877FB55-76BA-4714-ABB8-47258132F537", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*", matchCriteriaId: "4F9E8D45-5F12-4D45-A74E-C314FA3618A3", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*", matchCriteriaId: "6C7283FE-C10A-4E37-B004-15FB0CAC49A5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.", }, { lang: "es", value: "Una inyección SQL no especificada en Ivanti EPM antes de 2022 SU6 o la actualización de septiembre de 2024 permite que un atacante autenticado remoto con privilegios de administrador logre la ejecución remota de código.", }, ], id: "CVE-2024-32840", lastModified: "2024-09-12T22:35:01.747", metrics: { cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.1, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.3, impactScore: 6, source: "support@hackerone.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-09-12T02:15:02.257", references: [ { source: "support@hackerone.com", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022", }, ], sourceIdentifier: "support@hackerone.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-89", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2024-09-10 21:15
Modified
2024-09-12 21:53
Severity ?
5.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Summary
Missing authentication in Network Isolation of Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote unauthenticated attacker to isolate managed devices from the network.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ivanti | endpoint_manager | * | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2022 | |
ivanti | endpoint_manager | 2024 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B1F6549B-CF5D-4607-B67D-5489905A1705", versionEndExcluding: "2022", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", matchCriteriaId: "46580865-5177-4E55-BDAC-73DA4B472B35", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", matchCriteriaId: "E57E12B5-B789-450C-9476-6C4C151E6993", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", matchCriteriaId: "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", matchCriteriaId: "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", matchCriteriaId: "1877FB55-76BA-4714-ABB8-47258132F537", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*", matchCriteriaId: "4F9E8D45-5F12-4D45-A74E-C314FA3618A3", vulnerable: true, }, { criteria: "cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*", matchCriteriaId: "6C7283FE-C10A-4E37-B004-15FB0CAC49A5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Missing authentication in Network Isolation of Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote unauthenticated attacker to isolate managed devices from the network.", }, { lang: "es", value: "La falta de autenticación en el aislamiento de red de Ivanti EPM antes de 2022 SU6 o la actualización de septiembre de 2024 permite que un atacante remoto no autenticado aísle los dispositivos administrados de la red.", }, ], id: "CVE-2024-8321", lastModified: "2024-09-12T21:53:22.677", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-09-10T21:15:15.247", references: [ { source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", tags: [ "Vendor Advisory", ], url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022", }, ], sourceIdentifier: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-306", }, ], source: "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-306", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }