CyberSecurityNews

Ivanti Desktop and Server Management Vulnerability Allows Attackers to Escalate Privileges

2 dk okuma


Ivanti has issued a security update for its Desktop and Server Management (DSM) software, addressing a high-severity vulnerability that could allow a local authenticated attacker to escalate their privileges on affected systems.

The flaw, tracked as CVE-2026-3483, carries a CVSS score of 7.8 and affects all DSM versions up to and including 2026.1.

The vulnerability stems from an exposed dangerous method within Ivanti DSM, classified under CWE-749 (Exposed Dangerous Method or Function).

When a sensitive internal function is left accessible without proper restrictions, it creates an exploitable entry point for attackers who already have a foothold on the system.

In this case, a local authenticated user, someone who has already logged into the target machine, can leverage this exposed method to gain elevated system privileges.

The attack requires low complexity and no user interaction, making it straightforward to execute once initial access is established. The high impact ratings across confidentiality, integrity, and availability underscore the potential damage an attacker could cause after a successful escalation.

google

Privilege escalation vulnerabilities are particularly dangerous in enterprise environments, where DSM tools like Ivanti’s are deployed to manage large numbers of endpoints and servers.

An attacker who elevates privileges on a management platform could potentially push malicious configurations, access sensitive data across managed devices, or disrupt critical IT operations.

Ivanti has resolved the vulnerability in DSM version 2026.1.1, now available through the Ivanti License System (ILS). Organizations running any version of DSM 2026.1 or earlier should prioritize updating immediately.

Ivanti confirmed that it is not aware of any active exploitation of CVE-2026-3483 at the time of public disclosure. The vulnerability was reported through the company’s responsible disclosure program, allowing Ivanti to develop and release a patch before threat actors could weaponize it. No indicators of compromise (IOCs) are currently available, as no public exploitation has been observed.

  • Update immediately to Ivanti DSM 2026.1.1 via the Ivanti License System
  • Reference Ivanti’s official Updating the Environment documentation for step-by-step upgrade guidance
  • Review the Release Notes for DSM 2026.1.1 for additional details on changes included in the update
  • Monitor endpoints for any anomalous privilege activity while the patch is being deployed.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

googlenews



Source link

Bu haberi paylaş