Ivanti has rolled out crucial software updates to patch multiple security flaws in their Endpoint Manager (EPM), including ten critical vulnerabilities that could lead to remote code execution (RCE). These vulnerabilities, if exploited, could allow attackers to gain full control over affected systems.
These vulnerabilities impact EPM versions 2024 and 2022 SU5 and earlier. Ivanti has provided fixes in the latest versions, specifically 2024 SU1 and 2022 SU6.
While Ivanti has confirmed that there is no evidence of these vulnerabilities being exploited in the wild, it is imperative for users to update their systems promptly to mitigate any potential threats. In addition to these critical patches, Ivanti’s September update also addresses seven high-severity flaws in Ivanti Workspace Control (IWC) and Ivanti Cloud Service Appliance (CSA).
Ivanti has stated that it has enhanced its internal scanning, manual exploitation testing, and responsible disclosure processes, leading to a significant increase in the discovery and disclosure of vulnerabilities. These improvements are part of their ongoing efforts to secure their products against emerging threats.
In related news, Zyxel has also released patches for a critical command injection vulnerability (CVE-2024-6342, CVSS score: 9.8) affecting two of its network-attached storage (NAS) devices. This flaw could allow an unauthenticated attacker to execute operating system commands via a crafted HTTP POST request.
The affected devices and the fixed versions are:
Users of these devices are strongly encouraged to apply the updates immediately to secure their systems against potential exploitation.
As always, staying on top of software updates and patches is critical to maintaining your organization’s security. Make sure to review your systems regularly and apply all relevant updates to safeguard your network from these and other emerging vulnerabilities.
For more detailed guidance or assistance with these updates, feel free to reach out to our team.