First published: Thu Sep 12 2024(Updated: )
An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ivanti Endpoint Manager (EPM) | <2022 | |
Ivanti Endpoint Manager (EPM) | =2022 | |
Ivanti Endpoint Manager (EPM) | =2022-su1 | |
Ivanti Endpoint Manager (EPM) | =2022-su2 | |
Ivanti Endpoint Manager (EPM) | =2022-su3 | |
Ivanti Endpoint Manager (EPM) | =2022-su4 | |
Ivanti Endpoint Manager (EPM) | =2022-su5 | |
Ivanti Endpoint Manager (EPM) | =2024 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-34779 has been classified as a critical vulnerability due to its potential for remote code execution.
To mitigate CVE-2024-34779, update Ivanti Endpoint Manager to version 2022 SU6 or later as well as the 2024 September update.
CVE-2024-34779 affects users of Ivanti Endpoint Manager versions prior to 2022 SU6 and the 2024 September update.
CVE-2024-34779 enables a remote authenticated attacker with admin privileges to perform SQL injection and potentially achieve remote code execution.
There are no known workarounds for CVE-2024-34779; patching the software is the recommended approach.