Description:
Ivanti has released a security advisory to address multiple vulnerabilities in Ivanti products. Detailed information about the vulnerabilities can be found at:
https://www.ivanti.com/blog/november-2024-security-update
Affected Systems:
- Ivanti Endpoint Manager (EPM) versions prior to 2024 September security update, and versions prior to 2022 SU6 September security update
- Ivanti Connect Secure versions prior to 22.7R2.3
- Ivanti Policy Secure versions prior to 22.7R1.2
- Ivanti Secure Access Client versions prior to 22.7R4
- Ivanti Avalanche versions prior to 6.4.6
For detailed information of the affected systems, please refer to the corresponding security advisory at vendor's website.
Impact:
Successful exploitation of the vulnerabilities could lead to remote code execution, denial of service or elevation of privilege on an affected system.
Recommendation:
Patches for affected systems are now available. System administrators of affected systems should follow the recommendations provided by the vendor and take immediate actions to mitigate the risk.
More Information:
- https://www.ivanti.com/blog/november-2024-security-update
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7571
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8495
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8539
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9420
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9842 (to CVE-2024-9843)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11004 (to CVE-2024-11007)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29211
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32839
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32841
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32844
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32847
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34780 (to CVE-2024-34782)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34784
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34787
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37376
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37398
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37400
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38649
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38654 (to CVE-2024-38656)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39709 (to CVE-2024-39712)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47905 (to CVE-2024-47907)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47909
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50317 (to CVE-2024-50324)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50326 (to CVE-2024-50331)