What is Ivanti Endpoint Manager (EPM)?
Ivanti Endpoint Manager (EPM) is an enterprise IT asset management and endpoint control platform used by organizations to centrally discover, inventory, deploy software to, and manage the lifecycle of Windows, macOS, Linux, and mobile devices across their network. It is distinct from Ivanti EPMM (Endpoint Manager Mobile) — EPM focuses on traditional endpoints rather than mobile fleet management.
Key functions include:
- Asset discovery and inventory — automatically discover and catalog all devices on the network, including hardware specifications, installed software, and patch status
- Software distribution — centrally deploy, update, and remove applications across thousands of endpoints simultaneously
- Patch management — identify missing patches and orchestrate patch deployment across the managed device fleet
- OS deployment — provision bare-metal and virtual machines with operating system images at scale
- Remote control and troubleshooting — allow IT administrators to remotely connect to and manage endpoints
- Credential management — store and use privileged credentials (domain admin accounts, service accounts) required to authenticate to and manage remote endpoints
Because EPM is deeply integrated into the network and holds a privileged position over every managed endpoint, it is a high-value target for attackers seeking to move laterally or establish persistent access across an enterprise.
Overview
CVE-2024-29824 is an unauthenticated SQL injection vulnerability in the Core server component of Ivanti Endpoint Manager that allows an attacker on the same network segment to execute arbitrary operating system commands, achieving full remote code execution (RCE) under the EPM service account context.
The vulnerability was patched by Ivanti in May 2024, with a public proof-of-concept exploit released by Horizon3.ai in June 2024. By October 2024, Ivanti confirmed exploitation in the wild against a limited number of customers, prompting CISA to add it to the Known Exploited Vulnerabilities catalog and mandate patching for federal agencies by October 23, 2024.
Affected Versions
| Version | Status |
|---|---|
| EPM 2022 SU5 and prior | Vulnerable |
| EPM 2022 SU6 | Fixed |
| EPM 2024 (pre-SU1) | Vulnerable |
| EPM 2024 SU1 | Fixed |
Fix: Upgrade to Ivanti EPM 2022 SU6 or EPM 2024 SU1. The patch replaces five DLL files on the Core server; after applying the patch, either restart the Core server or close the EPM console and run IISRESET.
Technical Details
CVE-2024-29824 is a CWE-89 (SQL Injection) vulnerability located in PatchBiz.dll on the Ivanti EPM Core server. The vulnerable function is RecordGoodApp, which accepts user-supplied input and constructs SQL queries without proper validation or parameterization.
Attack chain:
- An unauthenticated attacker on the same network segment sends a crafted request to the EPM Core server's web service, invoking the
RecordGoodAppmethod with a malicious SQL payload embedded in the input parameter. - Because the input is not sanitized, the payload is interpreted by the underlying Microsoft SQL Server instance as executable SQL.
- The attacker uses SQL Server's
xp_cmdshellstored procedure (or another SQL-based execution mechanism) to run arbitrary operating system commands under the EPM service account context. - The result is full code execution on the EPM Core server without any credentials.
Attack characteristics:
- Attacker must be on the same network as the EPM Core server (CVSS Attack Vector: Adjacent) — the EPM management interface is typically not internet-facing
- No credentials or prior authentication required
- No user interaction required
- A single crafted request is sufficient to achieve code execution
- Execution context is the EPM service account, which typically holds elevated privileges on the host and across managed endpoints
CWE-89 (Improper Neutralization of Special Elements used in an SQL Command): The application constructs SQL queries using user-supplied data without escaping or parameterizing the input, allowing an attacker to alter the intended query structure and inject arbitrary SQL commands.
Discovery
CVE-2024-29824 was reported to Ivanti by an anonymous researcher through Trend Micro's Zero Day Initiative (ZDI) program. ZDI coordinated the disclosure, with Ivanti releasing the patch on May 24, 2024. Horizon3.ai independently analyzed the vulnerability and published a detailed technical deep dive alongside a working proof-of-concept exploit on GitHub in June 2024.
Exploitation Context
Ivanti confirmed in early October 2024 that a limited number of customers had been exploited in the wild, coinciding with CISA adding the vulnerability to the KEV catalog on October 2, 2024. This occurred approximately four months after the patch was available and three months after Horizon3.ai published the public PoC — a gap that suggests organizations were slow to apply the update.
The attack vector (Adjacent network) limits opportunistic internet-wide scanning, but the vulnerability is well-suited for targeted attacks where an attacker has already achieved an initial foothold on a network segment that can reach the EPM management interface. EPM Core servers are typically positioned on internal corporate networks alongside IT management infrastructure, making this relevant in post-initial-access scenarios.
The availability of a public proof-of-concept on GitHub lowered the barrier to exploitation significantly. SQL injection leading to xp_cmdshell execution is a well-understood attack pattern, and the PoC demonstrated blind command execution against vulnerable EPM appliances.
Remediation
- Upgrade to EPM 2022 SU6 or EPM 2024 SU1 — apply the patch immediately; after patching, restart the Core server or run
IISRESETas instructed - Isolate the EPM Core server — ensure the EPM management interface is not reachable from untrusted network segments; restrict access to authorized IT management hosts and subnets only using firewall rules
- Review SQL Server logs — examine Microsoft SQL Server logs for evidence of
xp_cmdshellcalls or other anomalous stored procedure executions that may indicate prior exploitation - Review EPM web server access logs — look for unusual or malformed requests to the EPM Core server web service from unexpected source IP addresses
- Audit the EPM service account — review Active Directory and local system logs for unauthorized activity performed under the EPM service account
- Hunt for post-exploitation indicators — if exploitation is suspected, review the host for new scheduled tasks, services, user accounts, or persistence mechanisms created around the exploitation window
- Discontinue use if patching to EPM 2022 SU6 or 2024 SU1 is not achievable — an unpatched EPM Core server reachable from any network segment with a known public exploit represents an unacceptable risk
Key Details
| Property | Value |
|---|---|
| CVE ID | CVE-2024-29824 |
| Vendor / Product | Ivanti — Endpoint Manager (EPM) |
| NVD Published | 2024-05-31 |
| NVD Last Modified | 2025-10-30 |
| CVSS 3.1 Score | 8.8 |
| CVSS 3.1 Vector | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| Severity | HIGH |
| CWE | CWE-89 |
| CISA KEV Added | 2024-10-02 |
| CISA KEV Deadline | 2024-10-23 |
| Known Ransomware Use | No |
CVSS 3.1 Breakdown
Required Action
Timeline
| Date | Event |
|---|---|
| 2024-04-03 | Vulnerability reported to Ivanti via Zero Day Initiative (ZDI) by an anonymous researcher |
| 2024-05-24 | Ivanti publishes Security Advisory EPM May 2024 and releases fix in EPM 2024 SU1 and EPM 2022 SU6 |
| 2024-05-31 | CVE-2024-29824 published to NVD |
| 2024-06-13 | Horizon3.ai publishes deep-dive technical analysis and releases proof-of-concept exploit on GitHub |
| 2024-10-02 | Ivanti confirms limited in-the-wild exploitation; CISA adds CVE-2024-29824 to Known Exploited Vulnerabilities catalog |
| 2024-10-23 | CISA BOD 22-01 remediation deadline for federal civilian executive branch agencies |
References
| Resource | Type |
|---|---|
| NVD — CVE-2024-29824 | Vulnerability Database |
| CISA KEV Catalog Entry | US Government |
| Ivanti Security Advisory — EPM May 2024 | Vendor Advisory |
| CVE-2024-29824 Deep Dive — Horizon3.ai | Security Research |
| Horizon3.ai PoC Exploit — GitHub | Security Research |
| Critical Ivanti RCE flaw with public exploit now used in attacks — BleepingComputer | News |
| Critical Ivanti Endpoint Manager flaw exploited — Help Net Security | News |
| Ivanti Endpoint Manager Flaw Actively Targeted, CISA Warns Agencies to Patch — The Hacker News | News |