CVE-2024-32846 (GCVE-0-2024-32846)
Vulnerability from cvelistv5
Published
2024-09-12 01:09
Modified
2024-09-12 21:15
Severity ?
EPSS score ?
Summary
An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.
References
Impacted products
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", ], defaultStatus: "affected", product: "endpoint_manager", vendor: "ivanti", versions: [ { lessThan: "2022_su6", status: "unaffected", version: "0", versionType: "custom", }, { lessThan: "2024_september_security_update", status: "unaffected", version: "2024", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-32846", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-09-12T03:55:16.752879Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-09-12T21:15:08.269Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "EPM", vendor: "Ivanti", versions: [ { lessThan: "2024 September Security Update", status: "affected", version: "2024 September Security Update", versionType: "custom", }, { lessThan: "2022 SU6", status: "affected", version: "2022 SU6", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.", }, ], metrics: [ { cvssV3_0: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, }, ], providerMetadata: { dateUpdated: "2024-09-12T01:09:56.175Z", orgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", shortName: "hackerone", }, references: [ { url: "https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022", }, ], }, }, cveMetadata: { assignerOrgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", assignerShortName: "hackerone", cveId: "CVE-2024-32846", datePublished: "2024-09-12T01:09:56.175Z", dateReserved: "2024-04-19T01:04:06.774Z", dateUpdated: "2024-09-12T21:15:08.269Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { fkie_nvd: { configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2022\", \"matchCriteriaId\": \"B1F6549B-CF5D-4607-B67D-5489905A1705\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"46580865-5177-4E55-BDAC-73DA4B472B35\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*\", \"matchCriteriaId\": \"E57E12B5-B789-450C-9476-6C4C151E6993\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*\", \"matchCriteriaId\": \"E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*\", \"matchCriteriaId\": \"10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*\", \"matchCriteriaId\": \"1877FB55-76BA-4714-ABB8-47258132F537\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F9E8D45-5F12-4D45-A74E-C314FA3618A3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C7283FE-C10A-4E37-B004-15FB0CAC49A5\"}]}]}]", descriptions: "[{\"lang\": \"en\", \"value\": \"An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.\"}, {\"lang\": \"es\", \"value\": \"Una inyecci\\u00f3n SQL no especificada en Ivanti EPM antes de 2022 SU6 o la actualizaci\\u00f3n de septiembre de 2024 permite que un atacante autenticado remoto con privilegios de administrador logre la ejecuci\\u00f3n remota de c\\u00f3digo.\"}]", id: "CVE-2024-32846", lastModified: "2024-09-12T22:35:04.737", metrics: "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.2, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.2, \"impactScore\": 5.9}], \"cvssMetricV30\": [{\"source\": \"support@hackerone.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H\", \"baseScore\": 9.1, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.3, \"impactScore\": 6.0}]}", published: "2024-09-12T02:15:02.883", references: "[{\"url\": \"https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022\", \"source\": \"support@hackerone.com\", \"tags\": [\"Vendor Advisory\"]}]", sourceIdentifier: "support@hackerone.com", vulnStatus: "Modified", weaknesses: "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-89\"}]}, {\"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-89\"}]}]", }, nvd: "{\"cve\":{\"id\":\"CVE-2024-32846\",\"sourceIdentifier\":\"support@hackerone.com\",\"published\":\"2024-09-12T02:15:02.883\",\"lastModified\":\"2024-09-12T22:35:04.737\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.\"},{\"lang\":\"es\",\"value\":\"Una inyección SQL no especificada en Ivanti EPM antes de 2022 SU6 o la actualización de septiembre de 2024 permite que un atacante autenticado remoto con privilegios de administrador logre la ejecución remota de código.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.2,\"impactScore\":5.9}],\"cvssMetricV30\":[{\"source\":\"support@hackerone.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":9.1,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.3,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-89\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-89\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2022\",\"matchCriteriaId\":\"B1F6549B-CF5D-4607-B67D-5489905A1705\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"46580865-5177-4E55-BDAC-73DA4B472B35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E57E12B5-B789-450C-9476-6C4C151E6993\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*\",\"matchCriteriaId\":\"10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*\",\"matchCriteriaId\":\"1877FB55-76BA-4714-ABB8-47258132F537\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F9E8D45-5F12-4D45-A74E-C314FA3618A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C7283FE-C10A-4E37-B004-15FB0CAC49A5\"}]}]}],\"references\":[{\"url\":\"https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022\",\"source\":\"support@hackerone.com\",\"tags\":[\"Vendor Advisory\"]}]}}", vulnrichment: { containers: "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-32846\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-12T03:55:16.752879Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*\"], \"vendor\": \"ivanti\", \"product\": \"endpoint_manager\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"2022_su6\", \"versionType\": \"custom\"}, {\"status\": \"unaffected\", \"version\": \"2024\", \"lessThan\": \"2024_september_security_update\", \"versionType\": \"custom\"}], \"defaultStatus\": \"affected\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-89\", \"description\": \"CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-12T21:14:56.614Z\"}}], \"cna\": {\"metrics\": [{\"cvssV3_0\": {\"version\": \"3.0\", \"baseScore\": 9.1, \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H\"}}], \"affected\": [{\"vendor\": \"Ivanti\", \"product\": \"EPM\", \"versions\": [{\"status\": \"affected\", \"version\": \"2024 September Security Update\", \"lessThan\": \"2024 September Security Update\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"2022 SU6\", \"lessThan\": \"2022 SU6\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.\"}], \"providerMetadata\": {\"orgId\": \"36234546-b8fa-4601-9d6f-f4e334aa8ea1\", \"shortName\": \"hackerone\", \"dateUpdated\": \"2024-09-12T01:09:56.175Z\"}}}", cveMetadata: "{\"cveId\": \"CVE-2024-32846\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-09-12T21:15:08.269Z\", \"dateReserved\": \"2024-04-19T01:04:06.774Z\", \"assignerOrgId\": \"36234546-b8fa-4601-9d6f-f4e334aa8ea1\", \"datePublished\": \"2024-09-12T01:09:56.175Z\", \"assignerShortName\": \"hackerone\"}", dataType: "CVE_RECORD", dataVersion: "5.1", }, }, }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.