Ivanti Released Updates for Ivanti Endpoint Manager (EPM)

Ivanti has addressed multiple critical and high severity vulnerabilities in its security advisory. Ivanti addressed 16 vulnerabilities impacting the Ivanti Endpoint Manager (EPM). Successful exploitation of the vulnerabilities may allow a remote, unauthenticated attacker to execute arbitrary code, elevation of privileges, and denial of service.

Ivanti mentioned in the advisory that there is no proof of any customers being exploited by these vulnerabilities before public disclosure. Ivanti EPM can help protect devices and data with tools like antivirus, application control, and firewall.

Ivanti Endpoint Manager (EPM) is a tool that helps IT administrators manage and secure devices and data across networks. It can manage Windows, macOS, Linux, iOS, and Android devices.

CVE-2024-10811, CVE-2024-13161, CVE-2024-13160, & CVE-2024-13159

The vulnerabilities have a critical severity rating with a CVSS score of 9.8. The path traversal vulnerability may allow a remote, unauthenticated attacker to leak sensitive information.

Affected and Patched Versions

Product Name Affected Versions Patched Versions Patch Availability
Ivanti Endpoint Manager 2024 November security update and prior,  
2022 SU6 November security update and prior
EPM 2024 January-2025 Security Update, EPM 2022 SU6 January-2025 Security Update EPM 2024 January-2025 Patch

EPM 2022 SU6 January-2025 Patch

For more information, please refer to the Ivanti Security Advisory.

Qualys Detection

Qualys customers can scan their devices with QID 382673 to detect vulnerable assets.

Please continue to follow Qualys Threat Protection for more coverage of the latest vulnerabilities.

References

https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6?language=en_US

Leave a Reply

Your email address will not be published. Required fields are marked *