Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13160: CWE-36 Absolute Path Traversal in Ivanti Endpoint Manager

0
Critical
VulnerabilityCVE-2024-13160cvecve-2024-13160cwe-36
Published: Tue Jan 14 2025 (01/14/2025, 17:12:23 UTC)
Source: CVE Database V5
Vendor/Project: Ivanti
Product: Endpoint Manager

Description

Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 11:52:22 UTC

Technical Analysis

CVE-2024-13160 is an absolute path traversal vulnerability identified in Ivanti Endpoint Manager versions prior to the January 2025 security updates. The vulnerability arises from improper validation of user-supplied file paths, allowing an unauthenticated remote attacker to craft requests that traverse directories and access arbitrary files on the server. This can lead to unauthorized disclosure of sensitive information, including configuration files, credentials, or other critical data stored on the system. The vulnerability does not require any authentication or user interaction, making it highly exploitable remotely over the network. The CVSS v3.1 base score of 9.8 reflects the critical nature of this flaw, with attack vector being network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality (C:H), integrity (I:H), and availability (A:H). Although no public exploits have been reported yet, the vulnerability’s characteristics suggest it could be weaponized quickly. Ivanti Endpoint Manager is widely used by enterprises for endpoint management, patching, and security compliance, making this vulnerability a significant concern for IT infrastructure security. The flaw is categorized under CWE-36 (Absolute Path Traversal), a common and dangerous vulnerability class that can lead to severe data breaches and system compromise if exploited.

Potential Impact

The impact of CVE-2024-13160 is severe for organizations using Ivanti Endpoint Manager. Successful exploitation can lead to unauthorized disclosure of sensitive files, potentially exposing credentials, configuration data, and other confidential information. This can facilitate further attacks such as privilege escalation, lateral movement, or disruption of endpoint management operations. The vulnerability affects confidentiality, integrity, and availability, potentially allowing attackers to manipulate or disrupt endpoint management processes critical for organizational security. Given Ivanti Endpoint Manager’s role in managing large fleets of devices, exploitation could compromise the security posture of entire enterprise networks. The lack of authentication requirement and ease of exploitation increase the risk of widespread attacks, especially in environments where the management interface is exposed to untrusted networks. This could lead to regulatory compliance violations, financial losses, and reputational damage for affected organizations.

Mitigation Recommendations

Organizations should immediately plan to apply the January 2025 security updates from Ivanti once available to remediate CVE-2024-13160. Until patches are deployed, restrict network access to the Ivanti Endpoint Manager interface by implementing firewall rules or network segmentation to limit exposure to trusted internal networks only. Monitor logs and network traffic for unusual file access patterns or attempts to traverse directories. Employ intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect path traversal attempts targeting Ivanti products. Review and harden file system permissions on servers hosting Ivanti Endpoint Manager to minimize the impact of potential unauthorized file access. Additionally, conduct regular security assessments and penetration testing focused on endpoint management infrastructure to identify and remediate similar vulnerabilities proactively. Maintain an incident response plan tailored to endpoint management compromise scenarios to reduce response times if exploitation is detected.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
ivanti
Date Reserved
2025-01-07T02:28:25.356Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9b0247d717aace268be

Added to database: 10/21/2025, 7:06:24 PM

Last enriched: 2/28/2026, 11:52:22 AM

Last updated: 3/24/2026, 4:35:38 PM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses