Ivanti and the US cybersecurity agency CISA issued warnings this week about another Ivanti product vulnerability being exploited in the wild.
The flaw impacts Ivanti Endpoint Manager (EPM) and it has been described by the vendor as an SQL injection that allows an unauthenticated attacker within the same network to execute arbitrary code.
The vulnerability, tracked as CVE-2024-29824 and classified as ‘critical’, impacts the Core server of Ivanti EPM 2022 SU5 and prior.
The issue was patched in May and Ivanti updated its advisory on October 1 to inform customers that it’s aware of in-the-wild exploitation. The company says CVE-2024-29824 has been used against “a limited number of customers”.
CISA added the vulnerability to its Known Exploited Vulnerabilities (KEV) catalog on Tuesday, instructing government agencies to address it by October 23.
Cybersecurity firm Horizon3.ai published technical details for the flaw in mid-June, as well as a proof-of-concept (PoC) exploit.
There does not appear to be any public information on the attacks exploiting CVE-2024-29824, but Ivanti product vulnerabilities have been known to be exploited in various types of attacks.
CISA’s KEV list currently contains more than 20 Ivanti product vulnerabilities. Three other Ivanti product vulnerabilities were found to be exploited in the wild in recent weeks.
One is CVE-2024-7593, a Virtual Traffic Manager (vTM) issue for which reports of exploitation emerged in late September. The other two are CVE-2024-8963 and CVE-2024-8190, which impact Ivanti Cloud Services Appliance (CSA) and which have been chained for unauthenticated remote code execution.
Related: Chinese Cyberspies Use New Malware in Ivanti VPN Attacks
Related: Governments Urge Organizations to Hunt for Ivanti VPN Attacks
Related: Ivanti Patches Critical Vulnerabilities in Endpoint Manager