Moderate
CVE-2023-28324
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2023-28324
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
A improper input validation vulnerability exists in Ivanti Endpoint Manager 2022 and below that could allow privilege escalation or remote code execution.
Add Assessment
Ratings
-
Attacker ValueMedium
-
ExploitabilityVery High
Technical Analysis
CVE-2023-28324 is an unauthenticated RCE affecting Ivanti EPM versions 2022 SU2 and prior. It was noted by Ivanti on June 7th, 2023 and later analyzed by Horizon3. The root cause of the vulnerability is an exposed .NET remoting method that can be used to execute an arbitrary OS command on the affected server. The .NET remoting service changes it’s port on each boot and they are typically unprivileged, high ports that are used. An attacker would need to scan high TCP port ranges to identify a listening service.
Once found however, the attacker can invoke Request
method on the LANDesk.AgentPortal.IAgentPortal
service to execute an arbitrary command. Likewise, the GetResult
method can be used to obtain the command output. The command is executed in the context of NT AUTHORITY\SYSTEM
. A medium attacker value was selected due to the requirement of finding and connecting to the service. The high, unprivileged port is very unlikely to be available on an external network, making this vulnerability primarily useful from an internal network perspective. As is the case with most command execution vulnerabilities, exploitation is very reliable and the target service is unlikely to crash even if the binary to run does not exist.
As noted in the Horizon3 analysis, the patch addresses the vulnerability by restricting what commands can be run to a static, predetermined set of values.
Would you also like to delete your Exploited in the Wild Report?
Delete Assessment Only Delete Assessment and Exploited in the Wild ReportCVSS V3 Severity and Metrics
General Information
Vendors
- ivanti
Products
- endpoint manager
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: