First published: Tue Jan 09 2024(Updated: )
An unspecified SQL Injection vulnerability in Ivanti Endpoint Manager released prior to 2022 SU 5 allows an attacker with access to the internal network to execute arbitrary SQL queries and retrieve output without the need for authentication. Under specific circumstances, this may also lead to RCE on the core server.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ivanti Endpoint Manager (EPM) | <2022 | |
Ivanti Endpoint Manager (EPM) | =2022 | |
Ivanti Endpoint Manager (EPM) | =2022-su1 | |
Ivanti Endpoint Manager (EPM) | =2022-su2 | |
Ivanti Endpoint Manager (EPM) | =2022-su3 | |
Ivanti Endpoint Manager (EPM) | =2022-su4 | |
Ivanti Endpoint Management | =2022 Service Update 5 | |
Ivanti Endpoint Manager Mobile | ||
Ivanti Sentry | ||
Ivanti Avalanche | ||
Perforce Helix Core Server | ||
Apache Struts 2 | ||
Sophos firewalls | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-39336 is classified as a critical SQL Injection vulnerability that may allow an attacker to execute arbitrary SQL queries.
To mitigate CVE-2023-39336, update Ivanti Endpoint Manager and other affected products to the latest security patch or version.
CVE-2023-39336 affects multiple Ivanti products including Ivanti Endpoint Management, Ivanti Endpoint Manager Mobile, and others released prior to 2022 SU 5.
Yes, under specific circumstances, exploitation of CVE-2023-39336 may lead to remote code execution.
An attacker with access to the internal network can exploit CVE-2023-39336 without the need for authentication.