Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13161: CWE-36 Absolute Path Traversal in Ivanti Endpoint Manager

0
Critical
VulnerabilityCVE-2024-13161cvecve-2024-13161cwe-36
Published: Tue Jan 14 2025 (01/14/2025, 17:11:32 UTC)
Source: CVE Database V5
Vendor/Project: Ivanti
Product: Endpoint Manager

Description

Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.

AI-Powered Analysis

AILast updated: 10/21/2025, 19:53:58 UTC

Technical Analysis

CVE-2024-13161 is an absolute path traversal vulnerability classified under CWE-36 affecting Ivanti Endpoint Manager prior to the 2024 January-2025 and 2022 SU6 January-2025 Security Updates. This vulnerability allows a remote attacker with no authentication or user interaction to craft specially crafted requests that exploit improper validation of file paths. By manipulating input parameters, the attacker can traverse the file system outside of intended directories and access sensitive files, potentially leaking confidential information. The vulnerability impacts confidentiality, integrity, and availability, as attackers could read sensitive configuration files, credentials, or system data, and potentially modify or disrupt service. The CVSS v3.1 score of 9.8 reflects the critical nature of this flaw, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality (C:H), integrity (I:H), and availability (A:H). Although no exploits are currently known in the wild, the ease of exploitation and severity make this a high-priority issue. Ivanti Endpoint Manager is widely used for endpoint management in enterprise environments, making this vulnerability a significant risk for organizations relying on this product for IT asset management and security enforcement.

Potential Impact

For European organizations, this vulnerability poses a severe risk to the confidentiality and integrity of sensitive corporate and personal data managed through Ivanti Endpoint Manager. Successful exploitation could lead to unauthorized disclosure of sensitive information such as credentials, configuration files, or proprietary data, potentially enabling further attacks or data breaches. The integrity and availability of endpoint management services could also be compromised, disrupting IT operations and security controls. Given the criticality of endpoint management in enterprise security, this could cascade into broader organizational risks including compliance violations under GDPR due to data exposure. The lack of authentication requirement and ease of exploitation increase the threat level, especially for organizations with externally accessible Ivanti management interfaces. This vulnerability could also be leveraged as a foothold for lateral movement within networks, amplifying its impact.

Mitigation Recommendations

Immediate application of the official Ivanti Endpoint Manager security updates released in the 2024 January-2025 and 2022 SU6 January-2025 Security Updates is essential. Organizations should verify that all instances of Ivanti Endpoint Manager are updated to these patched versions. Network segmentation and restricting access to the management interface to trusted internal networks or VPNs can reduce exposure. Implementing web application firewalls (WAFs) with rules to detect and block path traversal attempts can provide an additional layer of defense. Regularly audit and monitor logs for unusual file access patterns or suspicious requests targeting the management interface. Employ the principle of least privilege for service accounts and restrict file system permissions to minimize potential damage. Conduct internal penetration testing to verify the effectiveness of mitigations and ensure no residual vulnerabilities remain. Finally, maintain an incident response plan to quickly address any exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ivanti
Date Reserved
2025-01-07T02:28:30.244Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9b0247d717aace268c3

Added to database: 10/21/2025, 7:06:24 PM

Last enriched: 10/21/2025, 7:53:58 PM

Last updated: 10/29/2025, 9:55:56 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats