First published: Fri Jun 30 2023(Updated: )
A deserialization of untrusted data exists in EPM 2022 Su3 and all prior versions that allows an unauthenticated user to elevate rights. This exploit could potentially be used in conjunction with other OS (Operating System) vulnerabilities to escalate privileges on the machine or be used as a stepping stone to get to other network attached machines.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ivanti Endpoint Manager | <2022 | |
Ivanti Endpoint Manager | =2022 | |
Ivanti Endpoint Manager | =2022-su1 | |
Ivanti Endpoint Manager | =2022-su2 | |
Ivanti Endpoint Manager | =2022-su3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28323 is a vulnerability in Ivanti Endpoint Manager that allows an unauthenticated user to elevate rights.
CVE-2023-28323 has a severity rating of 9.8 (critical).
CVE-2023-28323 affects Ivanti Endpoint Manager 2022 Su3 and all prior versions.
An unauthenticated user can exploit CVE-2023-28323 by deserializing untrusted data, which allows them to elevate rights.
At the time of this writing, there is no official fix available for CVE-2023-28323. It is recommended to follow the guidance provided by Ivanti and apply any security patches or updates as soon as they are released.