First published: Thu Feb 15 2018(Updated: )
Ivanti Endpoint Security (formerly HEAT Endpoint Management and Security Suite) 8.5 Update 1 and earlier allows an authenticated user with low privileges and access to the local network to bypass application whitelisting when using the Application Control module on Ivanti Endpoint Security in lockdown mode.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ivanti Endpoint Security | <=8.5 | |
Ivanti Endpoint Security | =8.5-update_1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-6316 is classified as medium due to its potential to allow privileged access.
To mitigate CVE-2018-6316, upgrade to a version of Ivanti Endpoint Security later than 8.5 Update 1.
CVE-2018-6316 affects Ivanti Endpoint Security versions 8.5 and earlier, including the specific 8.5 Update 1.
The implications of CVE-2018-6316 include the ability for an authenticated low-privileged user to bypass application whitelisting.
CVE-2018-6316 is not directly exploitable over the internet as it requires an authenticated user with local network access.