PoC Released for Critical RCE Vulnerability in Ivanti Endpoint Manager
ConnectWise
A platform of software & services built for TSPs. Follow us for product updates, company news, business advice and more.
A recently disclosed critical remote code execution (RCE) vulnerability, tracked as CVE-2024-29847, has been actively exploited, impacting Ivanti Endpoint Manager. The flaw allows attackers to execute arbitrary code on affected systems through insecure deserialization of untrusted data, a vulnerability rooted in the deprecated Microsoft .NET Remoting framework used by the Ivanti AgentPortal.exe service. This vulnerability affects systems running Ivanti Endpoint Manager prior to the 2022 SU6 and 2024 versions, making patching essential to mitigate the threat.
The attack method involves injecting a maliciously crafted object into the .NET Remoting framework’s communication process. Attackers exploit the deserialization process to gain control over file operations on the server, such as writing web shells or executing arbitrary commands. Security researcher Sina Kheirkhah, who identified the flaw, demonstrated that despite basic safeguards, attackers can bypass them using advanced techniques, significantly increasing the risk of exploitation in unpatched environments.
As the proof-of-concept (PoC) exploit is now publicly available, organizations using Ivanti Endpoint Manager are at heightened risk. With the availability of a detailed attack guide, it is expected that malicious actors will leverage this flaw to target vulnerable systems, particularly in environments where patching may be delayed. Ivanti has released security patches in September 2024 for both its 2022 and 2024 versions, and organizations are urged to apply these patches immediately as no workarounds are available.
领英推荐
This vulnerability follows a trend of escalating attacks on Ivanti's products, with several high-severity vulnerabilities already exploited in the wild. Earlier in 2024, Ivanti's Endpoint Manager Mobile product faced active exploitation of a critical authentication bypass flaw (CVE-2024-8190). These incidents underscore the importance of proactive patch management, especially given the popularity of Ivanti's endpoint management solutions in enterprise environments.
Given the nature of the exploit, managed service providers (MSPs) and their clients should prioritize patching affected systems. Additionally, implementing network segmentation and limiting access to critical services could provide further protection against potential attacks exploiting this and similar vulnerabilities. The continued targeting of Ivanti's software highlights the growing sophistication of threat actors and the increasing need for vigilant, timely response strategies.
?
Professor na UDF Centro Universitário | Ciência da Computa??o, Engenharia de Software, Analise e Desenvolvimento de Software. Palestrante e Consultor. @prof.brulex
6 个月Metade das vagas já foram vendidas... e você está esperando o que para comprar seu ingresso? Https://bit.ly/cursobrulexforense Veja tudo que se passou no mindthesec.com.br 2024, e aprenda coisas diferentes sobrebcybersecurity.... #cybersecurity #security #segurancadigital #prof.brulex #ransomware @prof.brulex
CEO & Founder at Bihar Innovation | Leading Digital Transformation and Innovative Solutions
6 个月Bihar Innovation Pvt Ltd has been a wonderful partner for our digital needs. From designing our website to managing our social media accounts, their work has been nothing short of outstanding. They are responsive and always willing to accommodate our requests. I highly recommend their services! Contact: +91 8804789764 Email: [email protected] Website: www.biharinnovation.in