Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9713: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Ivanti Endpoint Manager

0
High
VulnerabilityCVE-2025-9713cvecve-2025-9713cwe-22
Published: Mon Oct 13 2025 (10/13/2025, 21:08:13 UTC)
Source: CVE Database V5
Vendor/Project: Ivanti
Product: Endpoint Manager

Description

Path traversal in Ivanti Endpoint Manager before version 2024 SU4 allows a remote unauthenticated attacker to achieve remote code execution. User interaction is required.

AI-Powered Analysis

AILast updated: 11/11/2025, 16:08:55 UTC

Technical Analysis

CVE-2025-9713 is a path traversal vulnerability classified under CWE-22 affecting Ivanti Endpoint Manager versions before 2024 SU4. The flaw arises from improper limitation of pathname inputs, allowing an attacker to traverse directories outside the intended restricted directory. This can be exploited remotely without authentication, but requires user interaction, such as clicking a malicious link or opening a crafted file. Successful exploitation enables remote code execution (RCE), granting the attacker the ability to execute arbitrary code with the privileges of the Endpoint Manager service, potentially leading to full system compromise. The vulnerability's CVSS 3.1 score of 8.8 indicates high severity, with network attack vector, low attack complexity, no privileges required, but user interaction necessary. Although no exploits are currently known in the wild, the impact on confidentiality, integrity, and availability is severe, as attackers can manipulate system files or deploy malware. Ivanti Endpoint Manager is widely used in enterprise environments for endpoint management, making this vulnerability particularly critical for organizations relying on it for device and security management. The lack of available patches at the time of reporting necessitates immediate mitigation efforts.

Potential Impact

European organizations using Ivanti Endpoint Manager face significant risks from this vulnerability. Successful exploitation could lead to unauthorized access to sensitive data, disruption of endpoint management services, and potential lateral movement within networks. This threatens confidentiality through data exposure, integrity by unauthorized code execution and system modification, and availability by potential service disruption or destruction of endpoint management capabilities. Critical sectors such as finance, healthcare, government, and manufacturing, which rely heavily on endpoint management for security and compliance, are particularly vulnerable. The requirement for user interaction slightly reduces the risk but does not eliminate it, especially in environments with high user exposure to phishing or social engineering. The absence of known exploits currently provides a window for proactive defense, but the high CVSS score underscores the urgency for European organizations to act swiftly.

Mitigation Recommendations

1. Immediately upgrade Ivanti Endpoint Manager to version 2024 SU4 or later once available to apply the official patch. 2. Until patching is possible, restrict network access to the Endpoint Manager interface using firewalls and network segmentation to limit exposure to untrusted networks. 3. Implement strict endpoint security policies to reduce the likelihood of successful user interaction with malicious content, including enhanced email filtering, user awareness training focused on phishing and social engineering, and application whitelisting. 4. Monitor Endpoint Manager logs and network traffic for unusual activity indicative of exploitation attempts, such as unexpected file access or execution patterns. 5. Employ endpoint detection and response (EDR) solutions to detect and block suspicious behaviors related to code execution or file system traversal. 6. Review and harden user privileges and service accounts associated with Endpoint Manager to minimize the impact of potential compromise. 7. Establish incident response procedures specifically addressing potential exploitation of this vulnerability to enable rapid containment and remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ivanti
Date Reserved
2025-08-29T23:03:24.774Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ed718fefcc33289f495f98

Added to database: 10/13/2025, 9:39:27 PM

Last enriched: 11/11/2025, 4:08:55 PM

Last updated: 12/2/2025, 4:02:12 PM

Views: 135

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats