Various components in Ivanti Endpoint Manager through 2020.1.1 rely on Windows search order when loading a (nonexistent) library file, allowing (under certain conditions) one to gain code execution (and elevation of privileges to the level of privilege held by the vulnerable component such as NT AUTHORITY\SYSTEM) via DLL hijacking. This affects ldiscn32.exe, IpmiRedirectionService.exe, LDAPWhoAmI.exe, and ldprofile.exe.
References
Link | Resource |
---|---|
https://labs.jumpsec.com/advisory-cve-2020-13771-ivanti-uem-dll-hijacking/ | Third Party Advisory |
https://labs.jumpsec.com/advisory-cve-2020-13771-ivanti-uem-dll-hijacking/ | Third Party Advisory |
Configurations
History
21 Nov 2024, 05:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://labs.jumpsec.com/advisory-cve-2020-13771-ivanti-uem-dll-hijacking/ - Third Party Advisory |
Information
Published : 2020-11-12 18:15
Updated : 2024-11-21 05:01
NVD link : CVE-2020-13771
Mitre link : CVE-2020-13771
CVE.ORG link : CVE-2020-13771
JSON object : View
Products Affected
ivanti
- endpoint_manager
CWE
CWE-427
Uncontrolled Search Path Element