Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13159: CWE-36 Absolute Path Traversal in Ivanti Endpoint Manager

0
Critical
VulnerabilityCVE-2024-13159cvecve-2024-13159cwe-36
Published: Tue Jan 14 2025 (01/14/2025, 17:12:57 UTC)
Source: CVE Database V5
Vendor/Project: Ivanti
Product: Endpoint Manager

Description

Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 11:52:06 UTC

Technical Analysis

CVE-2024-13159 is an absolute path traversal vulnerability (CWE-36) identified in Ivanti Endpoint Manager, a widely used endpoint management solution. This vulnerability exists in versions before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update. The flaw allows a remote attacker with no authentication or user interaction required to craft specially crafted requests that manipulate file path inputs. By exploiting this, the attacker can traverse the file system and access arbitrary files outside the intended directory scope. This can lead to unauthorized disclosure of sensitive information, including configuration files, credentials, or other critical data stored on the endpoint manager server. The vulnerability has a CVSS v3.1 base score of 9.8, reflecting its ease of exploitation (network vector, low attack complexity) and severe impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the vulnerability's nature and severity make it a prime target for attackers. Ivanti has published security updates addressing this issue, and organizations are urged to apply these patches promptly to prevent exploitation.

Potential Impact

The impact of CVE-2024-13159 is significant for organizations globally that rely on Ivanti Endpoint Manager for endpoint security and management. Successful exploitation can lead to unauthorized disclosure of sensitive files, potentially exposing credentials, configuration data, or other confidential information. This can facilitate further attacks such as lateral movement, privilege escalation, or data exfiltration. The vulnerability also threatens the integrity and availability of endpoint management services, potentially disrupting security operations and endpoint compliance enforcement. Given the critical CVSS score and the lack of authentication requirements, the risk of widespread exploitation is high once public exploit code becomes available. Enterprises in sectors with stringent data protection requirements, such as finance, healthcare, government, and critical infrastructure, face heightened risk due to the sensitivity of the data managed by Ivanti Endpoint Manager.

Mitigation Recommendations

To mitigate CVE-2024-13159, organizations should immediately apply the Ivanti Endpoint Manager security updates released in the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update. In addition to patching, organizations should implement network-level protections such as restricting access to the Endpoint Manager interface to trusted IP addresses and deploying web application firewalls (WAFs) with rules to detect and block path traversal attempts. Regularly audit and monitor logs for suspicious access patterns indicative of path traversal exploitation. Employ the principle of least privilege on the server hosting Endpoint Manager to limit the impact of any potential file disclosure. Conduct internal penetration testing to verify the effectiveness of mitigations. Finally, maintain an incident response plan tailored to endpoint management compromise scenarios to enable rapid containment and recovery.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
ivanti
Date Reserved
2025-01-07T02:28:21.601Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9b0247d717aace268b9

Added to database: 10/21/2025, 7:06:24 PM

Last enriched: 2/28/2026, 11:52:06 AM

Last updated: 3/25/2026, 8:55:33 PM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses