SB2025011595 - Multiple vulnerabilities in Ivanti Endpoint Manager
Published: January 15, 2025 Updated: March 10, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 16 secuirty vulnerabilities.
1) Out-of-bounds write (CVE-ID: CVE-2024-13168)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error when processing untrusted input within the AlertService. A remote attacker can send specially crafted data to the application, trigger an out-of-bounds write and perform a denial of service (DoS) attack.
2) SQL injection (CVE-ID: CVE-2024-13162)
The vulnerability allows a remote user to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data within the updateAssetInfo method. A remote privileged user can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Note, the vulnerability exists due to incomplete fix for #VU97132 (CVE-2024-32848).
3) Deserialization of Untrusted Data (CVE-ID: CVE-2024-13163)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to insecure input validation when processing serialized data within the DecodeBase64Object method. A remote attacker can trick the victim into passing specially crafted data to the application and execute arbitrary code on the target system.
4) Use of uninitialized resource (CVE-ID: CVE-2024-13164)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to usage of uninitialized resources within the AlertService. A local user can disclose stored credentials and execute arbitrary code with elevated privileges.
5) Out-of-bounds write (CVE-ID: CVE-2024-13165)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error when processing untrusted input within the AlertService. A remote attacker can send specially crafted data to the application, trigger an out-of-bounds write and perform a denial of service (DoS) attack.
6) Out-of-bounds write (CVE-ID: CVE-2024-13166)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error when processing untrusted input within the AlertService. A remote attacker can send specially crafted data to the application, trigger an out-of-bounds write and perform a denial of service (DoS) attack.
7) Out-of-bounds write (CVE-ID: CVE-2024-13167)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error when processing untrusted input within the AlertService. A remote attacker can send specially crafted data to the application, trigger an out-of-bounds write and perform a denial of service (DoS) attack.
8) Type Confusion (CVE-ID: CVE-2024-13169)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a type confusion error within the AlertService. A local user can disclose stored credentials and execute arbitrary code with elevated privileges.
9) Absolute Path Traversal (CVE-ID: CVE-2024-10811)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to insufficient input validation. A remote non-authenticated attacker can view contents of arbitrary files on the system and use the obtain information to execute arbitrary code.
10) Out-of-bounds write (CVE-ID: CVE-2024-13170)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error when processing untrusted input within the AlertService. A remote attacker can send specially crafted data to the application, trigger an out-of-bounds write and perform a denial of service (DoS) attack.
11) Arbitrary file upload (CVE-ID: CVE-2024-13171)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to insufficient validation of filename during file upload. A remote attacker can trick the victim into uploading a specially crafted file and execute arbitrary code on the system.
12) Improper verification of cryptographic signature (CVE-ID: CVE-2024-13172)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to improper certificate validation within the HIIDriver class. A remote attacker can trick the victim into using a specially crafted file to execute arbitrary code on the system.
13) Path traversal (CVE-ID: CVE-2024-13158)
The vulnerability allows a remote user to escalate privileges within the application.
The vulnerability exists due to input validation error when processing directory traversal sequences within the MyResolveEventHandler method. A remote user can send a specially crafted HTTP request and read arbitrary files on the system.
Successful exploitation of the vulnerability may lead to privilege escalation.
14) Absolute Path Traversal (CVE-ID: CVE-2024-13159)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to insufficient input validation. A remote non-authenticated attacker can view contents of arbitrary files on the system and use the obtain information to execute arbitrary code.
15) Absolute Path Traversal (CVE-ID: CVE-2024-13160)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to insufficient input validation. A remote non-authenticated attacker can view contents of arbitrary files on the system and use the obtain information to execute arbitrary code.
16) Absolute Path Traversal (CVE-ID: CVE-2024-13161)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to insufficient input validation. A remote non-authenticated attacker can view contents of arbitrary files on the system and use the obtain information to execute arbitrary code.
Remediation
Install update from vendor's website.
References
- https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6?language=en_US
- https://www.zerodayinitiative.com/advisories/ZDI-25-035/
- https://www.zerodayinitiative.com/advisories/ZDI-25-041/
- https://www.zerodayinitiative.com/advisories/ZDI-25-040/
- https://www.zerodayinitiative.com/advisories/ZDI-25-039/
- https://www.zerodayinitiative.com/advisories/ZDI-25-038/
- https://www.zerodayinitiative.com/advisories/ZDI-25-037/
- https://www.zerodayinitiative.com/advisories/ZDI-25-036/
- https://www.zerodayinitiative.com/advisories/ZDI-25-034/
- https://www.zerodayinitiative.com/advisories/ZDI-25-033/
- https://www.zerodayinitiative.com/advisories/ZDI-25-114/
- https://www.zerodayinitiative.com/advisories/ZDI-25-032/
- https://www.zerodayinitiative.com/advisories/ZDI-25-031/