First published: Wed Nov 13 2024(Updated: )
Path traversal in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a local unauthenticated attacker to achieve code execution. User interaction is required.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ivanti Endpoint Manager (EPM) | <2024 November Security Update<2022 SU6 November Security Update | |
Ivanti Endpoint Manager (EPM) | <2022 | |
Ivanti Endpoint Manager (EPM) | =2022 | |
Ivanti Endpoint Manager (EPM) | =2022-su1 | |
Ivanti Endpoint Manager (EPM) | =2022-su2 | |
Ivanti Endpoint Manager (EPM) | =2022-su3 | |
Ivanti Endpoint Manager (EPM) | =2022-su4 | |
Ivanti Endpoint Manager (EPM) | =2022-su5 | |
Ivanti Endpoint Manager (EPM) | =2024 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-34787 has a high severity rating due to its potential for allowing code execution by an unauthenticated local attacker.
To fix CVE-2024-34787, update your Ivanti Endpoint Manager to the November 2024 Security Update or the November 2022 SU6 Security Update.
Local unauthenticated attackers can exploit CVE-2024-34787, requiring user interaction for successful exploitation.
CVE-2024-34787 affects Ivanti Endpoint Manager versions prior to the 2024 November Security Update and 2022 SU6 November Security Update.
CVE-2024-34787 allows an attacker to execute arbitrary code, potentially compromising the integrity and security of the system.