Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-29824: Vulnerability in Ivanti EPM

0
Critical
VulnerabilityCVE-2024-29824cvecve-2024-29824
Published: Fri May 31 2024 (05/31/2024, 17:38:31 UTC)
Source: CVE Database V5
Vendor/Project: Ivanti
Product: EPM

Description

An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 10:36:51 UTC

Technical Analysis

CVE-2024-29824 is an SQL Injection vulnerability identified in the Core server of Ivanti Endpoint Manager (EPM) versions 2022 SU5 and prior. This vulnerability allows an unauthenticated attacker who has access to the same network segment as the vulnerable server to inject malicious SQL commands. The injection flaw stems from improper sanitization of user-supplied input in database queries, classified under CWE-89. Exploiting this flaw enables the attacker to execute arbitrary code on the server, potentially leading to full system compromise, including unauthorized data access, modification, or deletion, and disruption of service. The vulnerability has a CVSS v3.0 base score of 9.6, reflecting critical severity with a network attack vector (AV:A), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The scope is changed (S:C), meaning the vulnerability affects components beyond the initially vulnerable one, and it impacts confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). Although no public exploits are currently known, the nature of the vulnerability and the criticality of the affected product make it a high-risk issue. Ivanti EPM is widely used for endpoint management in enterprise environments, making this vulnerability particularly concerning for organizations relying on it for IT asset management and security operations.

Potential Impact

The impact of CVE-2024-29824 is severe for organizations using Ivanti EPM. Successful exploitation can lead to complete compromise of the EPM Core server, allowing attackers to execute arbitrary code, access sensitive data, alter configurations, or disrupt endpoint management services. This can result in unauthorized access to corporate networks, data breaches, loss of data integrity, and potential lateral movement within the network. Given Ivanti EPM's role in managing endpoints, attackers could leverage this access to deploy malware or ransomware, escalate privileges, or disable security controls. The vulnerability's exploitation does not require authentication or user interaction, increasing the risk of automated or wormable attacks within the same network. Organizations with large, distributed endpoint environments are particularly vulnerable, and the disruption could affect business continuity and compliance with regulatory requirements.

Mitigation Recommendations

1. Immediate patching: Monitor Ivanti's official channels for security updates or patches addressing CVE-2024-29824 and apply them promptly once released. 2. Network segmentation: Restrict network access to the Ivanti EPM Core server by isolating it within a secure management VLAN or subnet, limiting exposure to only trusted administrative hosts. 3. Access controls: Implement strict firewall rules and network access control lists (ACLs) to prevent unauthorized devices from reaching the EPM Core server. 4. Input validation and monitoring: Employ web application firewalls (WAFs) or intrusion detection/prevention systems (IDS/IPS) with SQL Injection detection capabilities to monitor and block suspicious database query patterns. 5. Logging and alerting: Enable detailed logging on the EPM server and monitor for unusual activities indicative of SQL Injection attempts or unauthorized access. 6. Incident response readiness: Prepare and test incident response plans specific to endpoint management compromise scenarios. 7. Least privilege principle: Ensure that the EPM server and its database run with minimal privileges necessary to limit the impact of potential exploitation. 8. Vendor communication: Engage with Ivanti support for guidance and to receive timely updates on remediation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
hackerone
Date Reserved
2024-03-20T01:04:06.689Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68f7d9b2247d717aace26a18

Added to database: 10/21/2025, 7:06:26 PM

Last enriched: 2/28/2026, 10:36:51 AM

Last updated: 3/26/2026, 1:21:09 AM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses