Security

Patches

Ivanti endpoint manager can become endpoint ravager, thanks to quartet of critical flaws

PoC exploit code shows why this is a patch priority


Security engineers have released a proof-of-concept exploit for four critical Ivanti Endpoint Manager bugs, giving those who haven't already installed patches released in January extra incentive to revisit their to-do lists.

The four vulnerabilities, all of which were rated 9.8 out of 10 CVSS severity scores, are tracked as CVE-2024-10811, CVE-2024-13161, CVE-2024-13160, and CVE-2024-13159.

Ivanti described all four as absolute path traversal flaws and fixed them for its Windows-based product in its January update.

At the time, the vendor didn't provide much detail about the critical security holes other than to note that a successful exploit would allow "a remote unauthenticated attacker to leak sensitive information."

A lot more info about the bugs is now available thanks to the appearance of a technical write-up by Zach Hanley, a vulnerability researcher at infosec consultancy Horizon3.ai. Hanley found and reported the flaws to Ivanti in October 2024, and on Wednesday published a proof-of-concept (PoC) exploit.

According to Hanley, all four flaws can be exploited by an unauthenticated attacker and can be abused "to coerce the Ivanti [Endpoint Manager] machine account credential to be used in relay attacks, potentially allowing for server compromise."

In slightly plainer English, what this all means is that it's possible for any miscreant who can reach the web-based APIs of a vulnerable Ivanti Endpoint Manager deployment to make that software reach out to a remote server when looking up a directory, and thus leak the manager's host machine's NTLMv2 hash to that remote server, which can be potentially used for account impersonation and other nefarious acts that lead to a system compromise.

It's as easy as passing a path such as \\\\10.0.0.1\\tmp\\thing[.]txt to parts of the API as a parameter, the manager then attempts to authenticate with 10.0.0.1 to access the path, and thus leaks an NTLMv2 hash to that remote box.

Ivanti told us it has found "no evidence” the flaws have been targeted, reminded us that patches are available, and urged their adoption now that PoC code is available as “new information in the public domain increases the risk of potential exploitation.”

That’s sound advice as attackers really like poking holes in Ivanti products, as was the case when Ivanti addressed zero-day exploits last month.

Ponder patch 2.0, too

Regardless of whether you applied the January patch, Ivanti has urged all users to implement a second version of its fix because the first caused an issue with the Windows "Action" tab that prevented users from creating new Windows Action packages or editing existing ones.

"We have updated this patch to a V2 version that restores the 'Actions' tab," a February 18 update to Ivanti’s security advisory noted. "If the original version was installed, V2 needs to be installed as well to restore the 'Actions' tab." ®

Send us news
Post a comment

How nice that state-of-the-art LLMs reveal their reasoning ... for miscreants to exploit

Blueprints shared for jail-breaking models that expose their chain-of-thought process

US Cyber Command reportedly pauses cyberattacks on Russia

PLUS: Phishing suspects used fishing gear as alibi; Apple's 'Find My' can track PCs and Androids; and more

Qualcomm pledges 8 years of security updates for Android kit using its chips (YMMV)

Starting with Snapdragon 8 Elite and 'droid 15

Microsoft expands Copilot bug bounty targets, adds payouts for even moderate messes

Said bugs 'can have significant implications' – glad to hear that from Redmond

Drug-screening biz DISA took a year to disclose security breach affecting millions

If there's something nasty on your employment record, extortion scum could come calling

Check out this free automated tool that hunts for exposed AWS secrets in public repos

You can find out if your GitHub codebase is leaking keys ... but so can miscreants

C++ creator calls for help to defend programming language from 'serious attacks'

Bjarne Stroustrup wants standards body to respond to memory-safety push as Rust monsters lurk at the door

Malware variants that target operational tech systems are very rare – but 2 were found last year

Fuxnet and FrostyGoop were both used in the Russia-Ukraine war

Healthcare outfit that served military personnel settles allegations it faked infosec compliance for $11M

If this makes you feel sick, knowing this happened before ransomware actors started targeting medical info may help

Bybit declares war on North Korea's Lazarus crime-ring to regain $1.5B stolen from wallet

Up to $140M in bounty rewards for return of Ethereum allegedly pilfered by hermit nation

100-plus spies fired after NSA internal chat board used for kinky sex talk

National intel boss slams naughty nattering on work systems as 'egregious violation of trust'

Ghost ransomware crew continues to haunt IT depts with scarily bad infosec

FBI and CISA issue reminder - deep sigh - about the importance of patching and backups