Home

Some companies that have chosen us

Privacy Officer and Privacy Consultant
CDP Scheme according to ISO/IEC 17024:2012
European Privacy Auditor
ISDP©10003 Certification Scheme according to ISO/IEC 17065:2012
Auditor
According to standard UNI 11697:2017
Lead Auditor ISO/IEC 27001:2022
According to standard ISO/IEC 17024:2012
Data Protection Officer
According to standard ISO/IEC 17024:2012
Anti-Bribery Lead Auditor Expert
According to standard ISO/IEC 17024:2012
ICT Security Manager
According to standard UNI 11506:2017
IT Service Management (ITSM)
According to the ITIL Foundation
Ethical Hacker (CEH)
According to the EC-Council
Network Defender (CND)
According to the EC-Council
Computer Hacking Forensics Investigator (CHFI)
According to the EC-Council
Penetration Testing Professional (CPENT)
According to the EC-Council

Professional qualifications

Stay up-to-date with world news!

Select your topics of interest:
CYBER ALERT
Home / CYBER ALERT
/
Ivanti January Security Update (AL01/250116/CSIRT-ITA)

Ivanti January Security Update (AL01/250116/CSIRT-ITA)

Summary

Ivanti is releasing security updates that address 20 vulnerabilities, including 4 critical and 16 high severity vulnerabilities, in Ivanti EPM, Ivanti Avalanche, Ivanti Application Control, Ivanti Security Controls, and Ivanti Neurons for App Control.

Note: Proofs of Concept (PoC) for exploiting the vulnerabilities CVE-2024-13161, CVE-2024-13160, CVE-2024-13159, and CVE-2024-10811 are available online.

Risk

Vulnerability Community Impact Estimation: Critical (75.38)

Type

  • Remote Code Execution
  • Authentication Bypass
  • Privilege Escalation
  • Information Leakage
  • Security Restrictions Bypass
  • Denial of Service

Affected Products and/or Versions

  • Ivanti Endpoint Manager 2024, November Security Update and earlier
  • Ivanti Endpoint Manager 2022 SU6, November Security Update and earlier
  • Ivanti Avalanche, version 6.4.6 and earlier
  • Ivanti Application Control, versions 2024.3 and earlier, 2024.1 and earlier, 2023.3 and earlier
  • Ivanti Security Controls, version 2024.4.1 and earlier
  • Ivanti Neurons for App Control, automatically updated on December 12, 2024

Mitigation Actions

In In line with the vendor’s statements, it is recommended to update vulnerable products following the indications of the security bulletin reported in the References section.

It is highlighted that for all versions of Ivanti Security Controls the vendor will not release any patches considering the end of support date of the Ivanti Security Controls Application Control module (EOL). It is therefore recommended to follow the mitigations reported in the “Solution” section of the security bulletin.

CVE
CVE-2024-10630CVE-2024-13161CVE-2024-13166CVE-2024-13171
CVE-2024-10811CVE-2024-13162CVE-2024-13167CVE-2024-13172
CVE-2024-13158CVE-2024-13163CVE-2024-13168CVE-2024-13179
CVE-2024-13159CVE-2024-13164CVE-2024-13169CVE-2024-13180
CVE-2024-13160CVE-2024-13165CVE-2024-13170CVE-2024-13181

References

https://www.ivanti.com/blog/january-security-update

https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6

https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Avalanche-6-4-7-Multiple-CVEs

https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Application-Control-Engine-CVE-2024-10630

1This estimate is made taking into account several parameters, including: CVSS, availability of patches/workarounds and PoC, diffusion of the affected software/devices in the reference community.

Recommended to you

Search in 365TRUST

Our services