Ivanti on Jan. 4 patched a critical vulnerability (CVSS 9.6) in its endpoint manager (EPM) software that could have let an attacker with internal access launch a remote code execution (RCE).The vulnerability — CVE-2023-39336 — if exploited, could let an attacker leverage an unspecified SQL injection to execute arbitrary SQL queries and retrieve output without the need for authentication.In a blog post, Ivanti said this can then let an attacker control the machines running the EPM agent and when the core server has been configured to use SQL Express, this could lead to an RCE on the core server.Ivanti made clear it had no indication that customers are impacted by the vulnerability. However, it said the bug affects all supported versions of the product and was resolved in the Ivanti EPM 2022 Service Update 5. The vendor credited hir0ot for identifying and reporting the Ivanti EPM issue. Security pros should take note that Ivanti has experienced issues with its products over the past several months. In August, Ivanti disclosed that a zero-day vulnerability in its Ivanti Sentry gateway was being actively exploited in the wild. In the summer of 2023, its endpoint manager mobile (EPMM) platform was exposed to two high profile critical vulnerabilities, one of which was exploited in an attack on 12 ministries within the Norwegian government.
Endpoint/Device Security, Patch/Configuration Management
Ivanti patches critical flaw in its EPM software

Ivanti patched a critical vulnerability in its endpoint management software. (Adobe Stock)
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds