CVE-2024-29847 - Ivanti & Zyxel Critical Vulnerability Patches: Update Now

Critical patches released for Ivanti Endpoint Manager and Zyxel NAS devices. Protect your systems from severe vulnerabilities—update to the latest versions now.

By
Peter Bassill
September 11, 2024
2
min read
CVE-2024-29847 - Ivanti & Zyxel Critical Vulnerability Patches: Update Now

Ivanti has rolled out crucial software updates to patch multiple security flaws in their Endpoint Manager (EPM), including ten critical vulnerabilities that could lead to remote code execution (RCE). These vulnerabilities, if exploited, could allow attackers to gain full control over affected systems.

Key Vulnerabilities in Ivanti Endpoint Manager

  • CVE-2024-29847 (CVSS score: 10.0): A deserialization vulnerability that allows a remote, unauthenticated attacker to execute arbitrary code. This flaw is rated as maximum severity.
  • CVE-2024-32840 to CVE-2024-34785 (CVSS scores: 9.1): A series of SQL injection vulnerabilities that could enable a remote attacker with admin privileges to execute code remotely.

These vulnerabilities impact EPM versions 2024 and 2022 SU5 and earlier. Ivanti has provided fixes in the latest versions, specifically 2024 SU1 and 2022 SU6.

While Ivanti has confirmed that there is no evidence of these vulnerabilities being exploited in the wild, it is imperative for users to update their systems promptly to mitigate any potential threats. In addition to these critical patches, Ivanti’s September update also addresses seven high-severity flaws in Ivanti Workspace Control (IWC) and Ivanti Cloud Service Appliance (CSA).

Ivanti has stated that it has enhanced its internal scanning, manual exploitation testing, and responsible disclosure processes, leading to a significant increase in the discovery and disclosure of vulnerabilities. These improvements are part of their ongoing efforts to secure their products against emerging threats.

Additional Security Updates: Zyxel

In related news, Zyxel has also released patches for a critical command injection vulnerability (CVE-2024-6342, CVSS score: 9.8) affecting two of its network-attached storage (NAS) devices. This flaw could allow an unauthenticated attacker to execute operating system commands via a crafted HTTP POST request.

The affected devices and the fixed versions are:

  • NAS326 (V5.21(AAZF.18)C0 and earlier): Fixed in V5.21(AAZF.18)Hotfix-01
  • NAS542 (V5.21(ABAG.15)C0 and earlier): Fixed in V5.21(ABAG.15)Hotfix-01

Users of these devices are strongly encouraged to apply the updates immediately to secure their systems against potential exploitation.

Stay Secure

As always, staying on top of software updates and patches is critical to maintaining your organization’s security. Make sure to review your systems regularly and apply all relevant updates to safeguard your network from these and other emerging vulnerabilities.

For more detailed guidance or assistance with these updates, feel free to reach out to our team.

Share this post