Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-29824: Vulnerability in Ivanti EPM

0
Critical
VulnerabilityCVE-2024-29824cvecve-2024-29824
Published: Fri May 31 2024 (05/31/2024, 17:38:31 UTC)
Source: CVE Database V5
Vendor/Project: Ivanti
Product: EPM

Description

An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code.

AI-Powered Analysis

AILast updated: 10/21/2025, 19:44:09 UTC

Technical Analysis

CVE-2024-29824 is a critical SQL Injection vulnerability identified in the Core server of Ivanti Endpoint Manager (EPM) versions 2022 SU5 and prior. The flaw stems from improper sanitization of user-supplied input in SQL queries, classified under CWE-89, allowing an attacker to inject malicious SQL commands. Exploitation requires the attacker to be on the same network segment as the vulnerable server but does not require authentication or user interaction, significantly lowering the barrier to attack. Successful exploitation can lead to arbitrary code execution, enabling the attacker to gain full control over the affected system, compromise sensitive data, alter system configurations, or disrupt service availability. The vulnerability has a CVSS v3.0 score of 9.6, reflecting critical severity with high impact on confidentiality, integrity, and availability, and low attack complexity. Ivanti EPM is widely used for managing and securing endpoints in enterprise environments, making this vulnerability particularly dangerous as it can be leveraged to pivot within networks and escalate attacks. No patches were listed at the time of disclosure, emphasizing the need for immediate risk mitigation through network controls and monitoring until official fixes are released. The vulnerability was reserved in March 2024 and published in late May 2024, with no known exploits in the wild so far, but the potential for rapid weaponization remains high given the critical nature of the flaw.

Potential Impact

For European organizations, the impact of CVE-2024-29824 is substantial. Ivanti EPM is commonly deployed in enterprises for endpoint management, including critical infrastructure, government agencies, and large corporations. Exploitation could lead to unauthorized access to sensitive data, disruption of endpoint management operations, and potential lateral movement within corporate networks. This could result in data breaches, operational downtime, and loss of trust. The ability to execute arbitrary code without authentication increases the risk of ransomware deployment or espionage activities. The vulnerability's network-based attack vector means that organizations with flat or poorly segmented networks are particularly vulnerable. Given Europe's stringent data protection regulations such as GDPR, a breach exploiting this vulnerability could also lead to significant legal and financial penalties. Furthermore, the criticality of the vulnerability may attract threat actors targeting European strategic sectors, including finance, energy, and public administration.

Mitigation Recommendations

1. Immediate network segmentation to isolate Ivanti EPM Core servers from untrusted or less secure network segments, limiting attacker access. 2. Deploy strict firewall rules to restrict access to the EPM Core server only to trusted management consoles and administrators. 3. Monitor network traffic and logs for unusual SQL queries or unexpected database activity indicative of injection attempts. 4. Implement Intrusion Detection/Prevention Systems (IDS/IPS) with signatures or anomaly detection for SQL Injection patterns targeting Ivanti EPM. 5. Apply principle of least privilege to accounts and services interacting with the EPM Core server to minimize potential damage. 6. Regularly back up EPM configurations and critical data to enable recovery in case of compromise. 7. Stay alert for official patches or advisories from Ivanti and prioritize immediate deployment once available. 8. Conduct internal vulnerability scans and penetration tests focusing on the EPM infrastructure to identify exposure. 9. Educate network administrators about the vulnerability and signs of exploitation to enhance detection capabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
hackerone
Date Reserved
2024-03-20T01:04:06.689Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68f7d9b2247d717aace26a18

Added to database: 10/21/2025, 7:06:26 PM

Last enriched: 10/21/2025, 7:44:09 PM

Last updated: 10/30/2025, 12:18:07 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats