
Severity
High
Analysis Summary
Ivanti has released patches addressing multiple critical and high-severity vulnerabilities in its products, including Endpoint Manager (EPM), Avalanche, and Application Control Engine. The most critical issues, tracked as CVE-2024-10811, CVE-2024-13161, CVE-2024-13160, and CVE-2024-13159, involve absolute path traversal vulnerabilities in Ivanti EPM. These flaws, with a CVSS score of 9.8, allow remote, unauthenticated attackers to leak sensitive information. They affect EPM versions 2024 and 2022 SU6 with the November 2024 security update installed.
In addition, Ivanti's January 2025 security updates resolve 12 high-severity flaws in EPM. These include remote code execution (RCE), denial-of-service (DoS), and privilege escalation vulnerabilities, with some exploitable remotely and without authentication.
Avalanche version 6.4.7 addresses three high-severity path traversal flaws—CVE-2024-13181, CVE-2024-13180, and CVE-2024-13179—that enable unauthenticated attackers to bypass authentication and leak sensitive information. Two of these vulnerabilities also fix incomplete patches for CVE-2024-47010 and CVE-2024-47011 released in October 2024.
Ivanti also patched a high-severity race condition in Application Control Engine that could allow attackers to bypass application blocking. Exploitation of this flaw requires authentication. Updates are available for Application Control versions 2024.3 HF1, 2024.1 HF4, and 2023.3 HF3. However, the Application Control Module for Security Controls will no longer receive updates, and Ivanti recommends migrating to Application Control or Neurons for App Control.
Ivanti emphasizes there is no evidence of these vulnerabilities being exploited in the wild and confirms that other Ivanti products are not impacted.
Organizations are strongly advised to apply these patches promptly to secure their systems, as threat actors have a history of targeting Ivanti vulnerabilities.
Impact
- Denial of Service
- Sensitive Information Theft
- Remote Code Execution
- Privilege Escalation
Indicators of Compromise
CVE
CVE-2024-13181
CVE-2024-13180
CVE-2024-13179
CVE-2024-10630
CVE-2024-1081
CVE-2024-13161
CVE-2024-13160
CVE-2024-13159
CVE-2024-13158
CVE-2024-13171
CVE-2024-13170
CVE-2024-13169
CVE-2024-13168
CVE-2024-13167
CVE-2024-13166
CVE-2024-13165
CVE-2024-13164
CVE-2024-13163
CVE-2024-13162
Affected Vendors
Affected Products
- Ivanti Avalanche 6.4.6 and prior
- Ivanti Application Control 2024.3 and prior
- Ivanti Application Control 2024.1 and prior
- Ivanti Application Control 2023.3 and prior
- Ivanti Security Controls 2024.4.1 and prior
- Ivanti Neurons for App Control
- Ivanti Endpoint Manager 2024
- Ivanti Endpoint Manager 2022 SU6
Remediation
- Refer to Ivanti Security Advisory for patch, upgrade, or suggested workaround information.
- Organizations must test their assets for the vulnerabilities mentioned above and apply the available security patch or mitigation steps as soon as possible.
- Implement multi-factor authentication to add an extra layer of security to login processes.
- Regularly monitor network activity for any unusual behavior, as this may indicate that a cyberattack is underway.
- Organizations must stay vigilant and follow best practices for cybersecurity to protect their systems and data from potential threats. This includes regularly updating software and implementing strong access controls and monitoring tools.
- Develop a comprehensive incident response plan to respond effectively in case of a security breach or data leakage.
- Maintain regular backups of critical data and systems to ensure data recovery in case of a security incident.
- Adhere to security best practices, including the principle of least privilege, and ensure that users and applications have only the necessary permissions.
- Establish a robust patch management process to ensure that security patches are evaluated, tested, and applied promptly.
- Conduct security audits and assessments to evaluate the overall security posture of your systems and networks.
- Implement network segmentation to contain and isolate potential threats to limit their impact on critical systems.