First published: Tue Sep 10 2024(Updated: )
Weak authentication in Patch Management of Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker to access restricted functionality.
Credit: 3c1d8aa1-5a33-4ea4-8992-aadd6440af75
Affected Software | Affected Version | How to fix |
---|---|---|
Ivanti Endpoint Manager (EPM) | <2022 | |
Ivanti Endpoint Manager (EPM) | =2022 | |
Ivanti Endpoint Manager (EPM) | =2022-su1 | |
Ivanti Endpoint Manager (EPM) | =2022-su2 | |
Ivanti Endpoint Manager (EPM) | =2022-su3 | |
Ivanti Endpoint Manager (EPM) | =2022-su4 | |
Ivanti Endpoint Manager (EPM) | =2022-su5 | |
Ivanti Endpoint Manager (EPM) | =2024 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8322 has been classified with a moderate severity due to the potential for unauthorized access to restricted features.
To fix CVE-2024-8322, upgrade to Ivanti Endpoint Manager version 2022 SU6 or apply the September 2024 update.
CVE-2024-8322 affects Ivanti Endpoint Manager versions prior to 2022 SU6 and version 2024 before the September update.
CVE-2024-8322 can potentially allow remote authenticated attackers to exploit weak authentication for unauthorized access.
Yes, a patch is available through the updates mentioned for Ivanti Endpoint Manager versions 2022 SU6 and the September 2024 release.