
Cloud Vulnerability DB
A community-led vulnerabilities database
A path traversal vulnerability was identified in Ivanti Endpoint Manager (CVE-2024-50322), affecting versions before the 2024 November Security Update or 2022 SU6 November Security Update. The vulnerability allows local unauthenticated attackers to achieve code execution, though user interaction is required for successful exploitation (NVD, CVE Mitre).
The vulnerability is classified as CWE-22 (Improper Limitation of a Pathname to a Restricted Directory) and has received a CVSS v3.1 base score of 7.8 (HIGH) with the following vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. This indicates local attack vector, low attack complexity, no privileges required, and user interaction required, with high impacts on confidentiality, integrity, and availability (NVD).
If successfully exploited, this vulnerability can lead to code execution on the affected system, potentially compromising the security of the Ivanti Endpoint Manager installation. The high CVSS score indicates severe potential impacts on system confidentiality, integrity, and availability (NVD).
Organizations should update to either the 2024 November Security Update or the 2022 SU6 November Security Update, depending on their current version of Ivanti Endpoint Manager (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."