First published: Thu Mar 19 2020(Updated: )
An issue was discovered in Ivanti Workspace Control 10.3.110.0. One is able to bypass Ivanti's FileGuard folder protection by renaming the WMTemp work folder used by PowerGrid. A malicious PowerGrid XML file can then be created, after which the folder is renamed back to its original value. Also, CVE-2018-15591 exploitation can consequently be achieved by using PowerGrid with the /SEE parameter to execute the arbitrary command specified in the XML file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ivanti Workspace Control | =10.3.110.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-6382 is critical, with a score of 9.8 out of 10.
The affected software for CVE-2019-16382 is Ivanti Workspace Control version 10.3.110.0.
One can bypass Ivanti's FileGuard folder protection in CVE-2019-16382 by renaming the WMTemp work folder used by PowerGrid and creating a malicious PowerGrid XML file.
The recommended solutions for CVE-2019-16382 are to apply the necessary patches or updates provided by Ivanti, and closely monitor any unauthorized or suspicious activities.
More information about CVE-2019-16382 can be found at the Ivanti forums (https://forums.ivanti.com/s/article/Security-Alert-Ivanti-Workspace-Control-September-2019) and on Twitter (https://twitter.com/jmoosdijk).