First published: Tue Nov 12 2024(Updated: )
Path traversal in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a remote unauthenticated attacker to achieve remote code execution. User interaction is required.
Credit: 3c1d8aa1-5a33-4ea4-8992-aadd6440af75
Affected Software | Affected Version | How to fix |
---|---|---|
Ivanti Endpoint Manager (EPM) | <2022 | |
Ivanti Endpoint Manager (EPM) | =2022 | |
Ivanti Endpoint Manager (EPM) | =2022-su1 | |
Ivanti Endpoint Manager (EPM) | =2022-su2 | |
Ivanti Endpoint Manager (EPM) | =2022-su3 | |
Ivanti Endpoint Manager (EPM) | =2022-su4 | |
Ivanti Endpoint Manager (EPM) | =2022-su5 | |
Ivanti Endpoint Manager (EPM) | =2024 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50329 is considered a critical vulnerability due to its potential for remote code execution.
To mitigate CVE-2024-50329, apply the November 2024 Security Update or the 2022 SU6 November Security Update for Ivanti Endpoint Manager.
CVE-2024-50329 affects Ivanti Endpoint Manager versions up to 2022 and those released before the November 2024 Security Update.
Yes, user interaction is required for an attacker to successfully exploit CVE-2024-50329.
CVE-2024-50329 can allow a remote unauthenticated attacker to achieve remote code execution.