Vulnerabilities (CVE)

Filtered by vendor Ivanti Subscribe
Filtered by product Endpoint Manager
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-39336 1 Ivanti 1 Endpoint Manager 2024-01-12 N/A 8.8 HIGH
An unspecified SQL Injection vulnerability in Ivanti Endpoint Manager released prior to 2022 SU 5 allows an attacker with access to the internal network to execute arbitrary SQL queries and retrieve output without the need for authentication. Under specific circumstances, this may also lead to RCE on the core server.
CVE-2023-35077 2 Ivanti, Microsoft 2 Endpoint Manager, Windows 2023-07-31 N/A 7.5 HIGH
An out-of-bounds write vulnerability on windows operating systems causes the Ivanti AntiVirus Product to crash. Update to Ivanti AV Product version 7.9.1.285 or above.
CVE-2020-13771 1 Ivanti 1 Endpoint Manager 2020-11-24 6.9 MEDIUM 7.8 HIGH
Various components in Ivanti Endpoint Manager through 2020.1.1 rely on Windows search order when loading a (nonexistent) library file, allowing (under certain conditions) one to gain code execution (and elevation of privileges to the level of privilege held by the vulnerable component such as NT AUTHORITY\SYSTEM) via DLL hijacking. This affects ldiscn32.exe, IpmiRedirectionService.exe, LDAPWhoAmI.exe, and ldprofile.exe.
CVE-2020-13770 1 Ivanti 1 Endpoint Manager 2020-11-24 7.2 HIGH 7.8 HIGH
Several services are accessing named pipes in Ivanti Endpoint Manager through 2020.1.1 with default or overly permissive security attributes; as these services run as user ‘NT AUTHORITY\SYSTEM’, the issue can be used to escalate privileges from a local standard or service account having SeImpersonatePrivilege (eg. user ‘NT AUTHORITY\NETWORK SERVICE’).
CVE-2020-13769 1 Ivanti 1 Endpoint Manager 2020-11-21 6.5 MEDIUM 8.8 HIGH
LDMS/alert_log.aspx in Ivanti Endpoint Manager through 2020.1 allows SQL Injection via a /remotecontrolauth/api/device request.
CVE-2017-11463 1 Ivanti 1 Endpoint Manager 2018-03-28 6.5 MEDIUM 8.8 HIGH
In Ivanti Service Desk (formerly LANDESK Management Suite) versions between 2016.3 and 2017.3, an Unrestricted Direct Object Reference leads to referencing/updating objects belonging to other users. In other words, a normal user can send requests to a specific URI with the target user's username in an HTTP payload in order to retrieve a key/token and use it to access/update objects belonging to other users. Such objects could be user profiles, tickets, incidents, etc.