CVE ID | CVE-2024-50329 |
CVSS SCORE | 8.8, AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
AFFECTED VENDORS |
Ivanti |
AFFECTED PRODUCTS |
Endpoint Manager |
VULNERABILITY DETAILS |
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ivanti Endpoint Manager. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the vulscan utility. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the NETWORK SERVICE. |
ADDITIONAL DETAILS |
Ivanti has issued an update to correct this vulnerability. More details can be found at:
https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2024-for-EPM-2024-and-EPM-2022 |
DISCLOSURE TIMELINE |
|
CREDIT | 06fe5fd2bc53027c4a3b7e395af0b850e7b8a044 |