Connect with us

Hi, what are you looking for?



Ivanti Patches Critical Vulnerability in Endpoint Manager

CVE-2023-39336, a critical vulnerability in Ivanti EPM, may lead to device takeover and code execution on the server.

Ivanti zero-day

Enterprise software provider Ivanti on Thursday warned of a critical-severity vulnerability in its Endpoint Manager (EPM) product that could be exploited for remote code execution (RCE).

Tracked as CVE-2023-39336, the issue is described as an SQL injection bug that could allow an attacker that has access to the internal network to “execute arbitrary SQL queries and retrieve output without the need for authentication”.

Successful exploitation of the vulnerability, Ivanti notes in its advisory, could allow the attacker to take over devices running the EPM agent.

“When the core server is configured to use SQL express, this might lead to RCE on the core server,” Ivanti notes.

CVE-2023-39336 impacts EPM 2022 Service Update 4 and all prior versions, including EPM 2021 iterations, the company explains. Ivanti EPM 2022 Service Update 5 resolves the bug.

The US-based software provider has not made further details on the flaw available publicly, instead limiting access to customers only, likely to provide them with more time to apply the patches.

Ivanti makes no mention of the vulnerability being targeted in the wild, but security defects in its products are known to have been exploited in malicious attacks, including as zero-days.

One of the most recent such examples is CVE-2023-38035, a critical-severity issue in Ivanti’s Sentry mobile gateway. It was patched in late August 2023, after being exploited as a zero-day against some of the company’s customers.

Advertisement. Scroll to continue reading.

The month before, Ivanti addressed CVE-2023-35078 and CVE-2023-35081, two exploited bugs in its Endpoint Manager Mobile (EPMM) product. Both issues had been exploited as zero-days, likely by state-sponsored attackers, with CVE-2023-35078 likely exploited since at least April 2023, in attacks targeting the Norwegian government.

Related: Ivanti Patches Dozen Critical Vulnerabilities in Avalanche MDM Product

Related: Ivanti Ships Urgent Patch for API Authentication Bypass Vulnerability

Related: Ivanti Patches Critical Vulnerability in Avalanche Enterprise MDM Solution

Written By

Ionut Arghire is an international correspondent for SecurityWeek.


Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn about active threats targeting common cloud deployments and what security teams can do to mitigate them.


Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.


Expert Insights

Related Content


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...


A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...


Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.


Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.


The latest Chrome update brings patches for eight vulnerabilities, including seven reported by external researchers.