Description
SQL injection in Ivanti Endpoint Manager before version 2024 SU5 allows a remote authenticated attacker to read arbitrary data from the database.
Published: 2026-02-10
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Data Exposure via SQL Injection
Action: Patch
AI Analysis

Impact

The vulnerability is a classic SQL injection in the data access layer of Ivanti Endpoint Manager. An authenticated user who can log into the console can exploit a flaw in the input validation of a query parameter, enabling them to inject arbitrary SQL and read any table in the underlying database. This results in non‑destructive data exposure; attackers cannot modify data, but can compromise confidentiality of sensitive configuration, user credentials, or internal network information. The weakness is categorized as CWE-89.

Affected Systems

Affected versions include Ivanti Endpoint Manager 2024 prior to the SU5 release. All service‑update branches up to SU4, including SU1, SU2, SU3, and SU3 security release 1, SU4, SU4 sr1, and the generic 2024 release, are impacted. The impact applies to any deployment where the console runs on a machine that exposes a database and an authenticated session. All instances that have the vulnerable component and allow a user to submit the affected input are at risk.

Risk and Exploitability

The issue is scored CVSS 6.5, indicating moderate severity. EPSS is less than 1%, suggesting a low likelihood of exploitation at this time. The vulnerability appears in the KEV catalog only as not listed, so no widespread exploitation is documented. The realistic attack surface requires an insider or compromised user account with at least read privileges. Considering the need for authentication, the risk to an organization hinges on password hygiene and segregation of duties. If an attacker gains the necessary credentials, they can read arbitrary data, but not execute code or modify data. The combination of moderate CVSS and very low EPSS puts the overall risk at moderate but with limited active exploitation pressure.

Generated by OpenCVE AI on April 17, 2026 at 20:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Ivanti Endpoint Manager SU5 release or newer to remove the flaw.
  • If an immediate upgrade is not possible, restrict the affected user's permissions to the minimum required for their role and monitor for suspicious database activity.
  • Deploy application-layer defenses such as web application firewalls, and enforce strict input validation or use parameterized queries if custom code is present.

Generated by OpenCVE AI on April 17, 2026 at 20:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 17 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Title SQL Injection in Ivanti Endpoint Manager Enables Remote Authenticated Data Retrieval

Thu, 12 Feb 2026 15:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager:2024:su1:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager:2024:su2:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager:2024:su3:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager:2024:su3_security_release_1:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager:2024:su4:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager:2024:su4_sr1:*:*:*:*:*:*

Tue, 10 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Ivanti
Ivanti endpoint Manager
Vendors & Products Ivanti
Ivanti endpoint Manager

Tue, 10 Feb 2026 15:45:00 +0000

Type Values Removed Values Added
Description SQL injection in Ivanti Endpoint Manager before version 2024 SU5 allows a remote authenticated attacker to read arbitrary data from the database.
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Ivanti Endpoint Manager
cve-icon MITRE

Status: PUBLISHED

Assigner: ivanti

Published:

Updated: 2026-02-26T15:04:12.393Z

Reserved: 2026-01-29T09:18:47.171Z

Link: CVE-2026-1602

cve-icon Vulnrichment

Updated: 2026-02-10T16:00:56.884Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-10T16:16:10.387

Modified: 2026-02-12T15:16:10.820

Link: CVE-2026-1602

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T21:00:12Z

Weaknesses