Author: Zack

Critical RCE Vulnerability Patched in Ivanti Endpoint Manager (CVE-2024-29847)

Summary

OEM

Ivanti

Severity

Critical

Date of Announcement

2024-09-13

CVSS Score

9.8

CVE

CVE-2024-29847

CWE

CWE-502

Exploited in Wild

Yes

Patch/Remediation Available

Yes

Advisory Version

1.0

Overview

A critical vulnerability (CVE-2024-29847) has been identified in Ivanti Endpoint Manager, allowing unauthenticated attackers to execute arbitrary code remotely. This flaw is due to a deserialization of untrusted data issue in the AgentPortal.exe service, specifically within the .NET Remote framework. Exploitation can allow attackers to perform file operations such as reading or writing files on the server, potentially leading to full system compromise.

Vulnerability Name

CVE ID

Product Affected

Impact

CVSS Score

Ivanti RCE (Remote code execution) Vulnerability

CVE-2024-29847

Ivanti Endpoint Manager (EPM) versions prior to 2022 SU6 and 2024 September updates

Critical

9.8

Technical Summary

CVE ID

System Affected

Vulnerability Details

Impact

CVE-2024-29847

Ivanti Endpoint Manager (EPM) versions prior to 2022 SU6 and 2024 September updates

The AgentPortal.exe service's insecure deserialization, notably in the On Start method that makes use of the antiquated Microsoft.NET Remoting framework, is the source of the vulnerability. Without any security enforcement, the service registers a TCP channel that makes it possible for attackers to inject malicious objects. Attackers can initiate file operations, such as reading, writing, or even executing arbitrary code on the server for example, launching web shells for remote code execution by transmitting a crafted hash table of serialized objects.

Remote Code Execution (RCE)

Remediation

Ivanti has released security updates addressing this vulnerability. Apply the latest patches for Ivanti EPM immediately:

  • Ivanti EPM 2022 SU6
  • Ivanti EPM September 2024 Update

General Recommendations:

  • Conduct regular vulnerability scans to ensure that all systems are up-to-date, and no vulnerable versions are in use.
  • Ensure that systems and users only have the minimum required access levels to reduce the impact of any compromise.
  • Segregate critical systems from the rest of the network to minimize potential damage from a successful exploitation.

Social login flaws put billions of users at risk of account takeover

Flaws in social login mechanisms are leaving thousands of websites and a billion of their users vulnerable to account takeovers, API security company Salt Security warns. The latest research by Salt Security identified flaws in the access token verification step of the social sign-in process, part of the OAuth implementation on these websites.

Continue Reading

Cisco Zero-Day Exploited to Implant Malicious Lua Backdoor

Cisco has identified a critical security issue affecting its IOS XE software, specifically a zero-day vulnerability tracked as CVE-2023-20273 with a CVSS score of 7.2. This flaw is actively exploited by unknown threat actors to deploy a malicious Lua-based implant on vulnerable devices. Additionally, this zero-day was utilized in conjunction with CVE-2023-20198 (CVSS score: 10.0) to create an exploit chain.

Continue Reading

Urgent Security Alert: Indian Government Warns iPhone and iPad Users to Update Immediately

In today’s digital age, our smartphones have become an essential part of our lives. They store sensitive information, offer access to personal accounts, and play a vital role in communication. As a result, it is crucial to stay updated on the latest security advisories, especially for mobile devices.

Continue Reading

New WordPress Backdoor Threatens Website Security: A Closer Look

The world of cybersecurity is constantly evolving, and so are the threats to websites and online platforms. In a recent discovery, a dangerous new malware has emerged, camouflaging itself as a legitimate caching plugin, specifically targeting WordPress websites. This insidious backdoor has the potential to wreak havoc by creating rogue administrators, taking control of websites, and undermining both user privacy and SEO rankings. This blog post will delve into the details of this new threat, its disguise, and its capabilities.

Continue Reading

Critical Government Alert: Protecting Android 13 and Older Devices – Risks, Affected Devices, and Security Measures

In a world where our smartphones have become an essential part of our lives, it is crucial to ensure their security. Recently, the Indian government issued a critical warning for Android users, particularly those using Android versions 13 and older. This warning is significant, given the large number of Android users in India.

Continue Reading

Strengthening Cyber Defense: NSA and CISA Unveil Top Ten Cybersecurity Misconfigurations

Cybersecurity is a top priority for organizations of all sizes, as cyber threats continue to evolve at an unprecedented pace. In response to this ever-changing landscape, the National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) have released a joint cybersecurity advisory (CSA) highlighting the top ten cybersecurity misconfigurations that leave organizations vulnerable to attack.

Continue Reading

Apple’s Swift Response: Emergency Update Zero-Day Vulnerabilities Exploiting iPhones

Apple has released an emergency security update to address two newly discovered zero-day vulnerabilities that have been actively exploited to attack iPhones and iPads.Apple has not confirmed any in-the-wild exploitation of the libvpx bug, but it is worth noting that Google and Microsoft have previously patched it as a zero-day in their products.The latest security update is available for all devices running iOS 17.0.3 and iPadOS 17.0.3 or later. Apple urges all users to install the update as soon as possible.

Continue Reading

Zero-Day WhatsApp Hacking Vulnerabilities Worth Millions: A Cause for Concern

In the ever-evolving cybersecurity landscape, zero-day vulnerabilities have become prized commodities, fetching jaw-dropping sums of money on the black market. These zero-day exploits, which can be used to compromise popular instant messaging apps like WhatsApp, have recently reached a staggering valuation in the millions of dollars. The surge in demand for such exploits poses a grave threat to the security of the millions of users who rely on these platforms for communication.

Continue Reading

Multiple Critical Vulnerabilities in Supermicro BMCs: Protecting Your Systems

In today’s digital landscape, where technology plays an increasingly vital role, security is paramount. The importance of safeguarding your systems against vulnerabilities cannot be overstated. In this context, we bring to your attention a critical security advisory regarding Supermicro baseboard management controllers (BMCs). Recent discoveries have unearthed a series of vulnerabilities in the Intelligent Platform Management Interface (IPMI) firmware used by Supermicro BMCs. These vulnerabilities have the potential to compromise system security and demand immediate attention from all stakeholders. Let’s delve into the details to understand the nature of the threat and how to protect your systems effectively.

Continue Reading
Scroll to top