CVE-2024-13160: CWE-36 Absolute Path Traversal in Ivanti Endpoint Manager
Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.
AI Analysis
Technical Summary
CVE-2024-13160 is an absolute path traversal vulnerability identified in Ivanti Endpoint Manager versions prior to the January 2025 security updates. The vulnerability arises from improper validation of user-supplied file paths, allowing an unauthenticated remote attacker to craft requests that traverse directories and access arbitrary files on the server. This can lead to unauthorized disclosure of sensitive information, including configuration files, credentials, or other critical data stored on the system. The vulnerability does not require any authentication or user interaction, making it highly exploitable remotely over the network. The CVSS v3.1 base score of 9.8 reflects the critical nature of this flaw, with attack vector being network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality (C:H), integrity (I:H), and availability (A:H). Although no public exploits have been reported yet, the vulnerability’s characteristics suggest it could be weaponized quickly. Ivanti Endpoint Manager is widely used by enterprises for endpoint management, patching, and security compliance, making this vulnerability a significant concern for IT infrastructure security. The flaw is categorized under CWE-36 (Absolute Path Traversal), a common and dangerous vulnerability class that can lead to severe data breaches and system compromise if exploited.
Potential Impact
The impact of CVE-2024-13160 is severe for organizations using Ivanti Endpoint Manager. Successful exploitation can lead to unauthorized disclosure of sensitive files, potentially exposing credentials, configuration data, and other confidential information. This can facilitate further attacks such as privilege escalation, lateral movement, or disruption of endpoint management operations. The vulnerability affects confidentiality, integrity, and availability, potentially allowing attackers to manipulate or disrupt endpoint management processes critical for organizational security. Given Ivanti Endpoint Manager’s role in managing large fleets of devices, exploitation could compromise the security posture of entire enterprise networks. The lack of authentication requirement and ease of exploitation increase the risk of widespread attacks, especially in environments where the management interface is exposed to untrusted networks. This could lead to regulatory compliance violations, financial losses, and reputational damage for affected organizations.
Mitigation Recommendations
Organizations should immediately plan to apply the January 2025 security updates from Ivanti once available to remediate CVE-2024-13160. Until patches are deployed, restrict network access to the Ivanti Endpoint Manager interface by implementing firewall rules or network segmentation to limit exposure to trusted internal networks only. Monitor logs and network traffic for unusual file access patterns or attempts to traverse directories. Employ intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect path traversal attempts targeting Ivanti products. Review and harden file system permissions on servers hosting Ivanti Endpoint Manager to minimize the impact of potential unauthorized file access. Additionally, conduct regular security assessments and penetration testing focused on endpoint management infrastructure to identify and remediate similar vulnerabilities proactively. Maintain an incident response plan tailored to endpoint management compromise scenarios to reduce response times if exploitation is detected.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, India, Netherlands, Sweden, Singapore
CVE-2024-13160: CWE-36 Absolute Path Traversal in Ivanti Endpoint Manager
Description
Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-13160 is an absolute path traversal vulnerability identified in Ivanti Endpoint Manager versions prior to the January 2025 security updates. The vulnerability arises from improper validation of user-supplied file paths, allowing an unauthenticated remote attacker to craft requests that traverse directories and access arbitrary files on the server. This can lead to unauthorized disclosure of sensitive information, including configuration files, credentials, or other critical data stored on the system. The vulnerability does not require any authentication or user interaction, making it highly exploitable remotely over the network. The CVSS v3.1 base score of 9.8 reflects the critical nature of this flaw, with attack vector being network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality (C:H), integrity (I:H), and availability (A:H). Although no public exploits have been reported yet, the vulnerability’s characteristics suggest it could be weaponized quickly. Ivanti Endpoint Manager is widely used by enterprises for endpoint management, patching, and security compliance, making this vulnerability a significant concern for IT infrastructure security. The flaw is categorized under CWE-36 (Absolute Path Traversal), a common and dangerous vulnerability class that can lead to severe data breaches and system compromise if exploited.
Potential Impact
The impact of CVE-2024-13160 is severe for organizations using Ivanti Endpoint Manager. Successful exploitation can lead to unauthorized disclosure of sensitive files, potentially exposing credentials, configuration data, and other confidential information. This can facilitate further attacks such as privilege escalation, lateral movement, or disruption of endpoint management operations. The vulnerability affects confidentiality, integrity, and availability, potentially allowing attackers to manipulate or disrupt endpoint management processes critical for organizational security. Given Ivanti Endpoint Manager’s role in managing large fleets of devices, exploitation could compromise the security posture of entire enterprise networks. The lack of authentication requirement and ease of exploitation increase the risk of widespread attacks, especially in environments where the management interface is exposed to untrusted networks. This could lead to regulatory compliance violations, financial losses, and reputational damage for affected organizations.
Mitigation Recommendations
Organizations should immediately plan to apply the January 2025 security updates from Ivanti once available to remediate CVE-2024-13160. Until patches are deployed, restrict network access to the Ivanti Endpoint Manager interface by implementing firewall rules or network segmentation to limit exposure to trusted internal networks only. Monitor logs and network traffic for unusual file access patterns or attempts to traverse directories. Employ intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect path traversal attempts targeting Ivanti products. Review and harden file system permissions on servers hosting Ivanti Endpoint Manager to minimize the impact of potential unauthorized file access. Additionally, conduct regular security assessments and penetration testing focused on endpoint management infrastructure to identify and remediate similar vulnerabilities proactively. Maintain an incident response plan tailored to endpoint management compromise scenarios to reduce response times if exploitation is detected.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ivanti
- Date Reserved
- 2025-01-07T02:28:25.356Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f7d9b0247d717aace268be
Added to database: 10/21/2025, 7:06:24 PM
Last enriched: 2/28/2026, 11:52:22 AM
Last updated: 3/23/2026, 6:31:18 PM
Views: 58
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.