Rewterz
Multiple WordPress Plugins Vulnerabilities
January 16, 2025
Rewterz
CVE-2024-55591 – Fortinet FortiOS and FortiProxy Zero-Day Vulnerability Exploit in the Wild
January 16, 2025

Ivanti Releases Critical Updates for EPM and Avalanche Vulnerabilities

Severity

High

Analysis Summary

Ivanti has released patches addressing multiple critical and high-severity vulnerabilities in its products, including Endpoint Manager (EPM), Avalanche, and Application Control Engine. The most critical issues, tracked as CVE-2024-10811, CVE-2024-13161, CVE-2024-13160, and CVE-2024-13159, involve absolute path traversal vulnerabilities in Ivanti EPM. These flaws, with a CVSS score of 9.8, allow remote, unauthenticated attackers to leak sensitive information. They affect EPM versions 2024 and 2022 SU6 with the November 2024 security update installed.

In addition, Ivanti's January 2025 security updates resolve 12 high-severity flaws in EPM. These include remote code execution (RCE), denial-of-service (DoS), and privilege escalation vulnerabilities, with some exploitable remotely and without authentication.

Avalanche version 6.4.7 addresses three high-severity path traversal flaws—CVE-2024-13181, CVE-2024-13180, and CVE-2024-13179—that enable unauthenticated attackers to bypass authentication and leak sensitive information. Two of these vulnerabilities also fix incomplete patches for CVE-2024-47010 and CVE-2024-47011 released in October 2024.

Ivanti also patched a high-severity race condition in Application Control Engine that could allow attackers to bypass application blocking. Exploitation of this flaw requires authentication. Updates are available for Application Control versions 2024.3 HF1, 2024.1 HF4, and 2023.3 HF3. However, the Application Control Module for Security Controls will no longer receive updates, and Ivanti recommends migrating to Application Control or Neurons for App Control.

Ivanti emphasizes there is no evidence of these vulnerabilities being exploited in the wild and confirms that other Ivanti products are not impacted.

Organizations are strongly advised to apply these patches promptly to secure their systems, as threat actors have a history of targeting Ivanti vulnerabilities.

Impact

  • Denial of Service
  • Sensitive Information Theft
  • Remote Code Execution
  • Privilege Escalation

Indicators of Compromise

CVE

  • CVE-2024-13181

  • CVE-2024-13180

  • CVE-2024-13179

  • CVE-2024-10630

  • CVE-2024-1081

  • CVE-2024-13161

  • CVE-2024-13160

  • CVE-2024-13159

  • CVE-2024-13158

  • CVE-2024-13171

  • CVE-2024-13170

  • CVE-2024-13169

  • CVE-2024-13168

  • CVE-2024-13167

  • CVE-2024-13166

  • CVE-2024-13165

  • CVE-2024-13164

  • CVE-2024-13163

  • CVE-2024-13162

Affected Vendors

Ivanti

Affected Products

  • Ivanti Avalanche 6.4.6 and prior
  • Ivanti Application Control 2024.3 and prior
  • Ivanti Application Control 2024.1 and prior
  • Ivanti Application Control 2023.3 and prior
  • Ivanti Security Controls 2024.4.1 and prior
  • Ivanti Neurons for App Control
  • Ivanti Endpoint Manager 2024
  • Ivanti Endpoint Manager 2022 SU6

Remediation

  • Refer to Ivanti Security Advisory for patch, upgrade, or suggested workaround information.
  • Organizations must test their assets for the vulnerabilities mentioned above and apply the available security patch or mitigation steps as soon as possible.
  • Implement multi-factor authentication to add an extra layer of security to login processes.
  • Regularly monitor network activity for any unusual behavior, as this may indicate that a cyberattack is underway.
  • Organizations must stay vigilant and follow best practices for cybersecurity to protect their systems and data from potential threats. This includes regularly updating software and implementing strong access controls and monitoring tools.
  • Develop a comprehensive incident response plan to respond effectively in case of a security breach or data leakage.
  • Maintain regular backups of critical data and systems to ensure data recovery in case of a security incident.
  • Adhere to security best practices, including the principle of least privilege, and ensure that users and applications have only the necessary permissions.
  • Establish a robust patch management process to ensure that security patches are evaluated, tested, and applied promptly.
  • Conduct security audits and assessments to evaluate the overall security posture of your systems and networks.
  • Implement network segmentation to contain and isolate potential threats to limit their impact on critical systems.