CVE-2024-13159

9.8 CRITICAL CISA KEV

📋 TL;DR

CVE-2024-13159 is an absolute path traversal vulnerability in Ivanti Endpoint Manager (EPM) that allows remote unauthenticated attackers to access sensitive files on the server. This affects Ivanti EPM 2024 and 2022 SU6 versions before the January 2025 security updates. Attackers can exploit this to leak credentials, configuration files, and other sensitive information.

💻 Affected Systems

Products:
  • Ivanti Endpoint Manager
Versions: EPM 2024 versions before January 2025 Security Update, EPM 2022 SU6 versions before January 2025 Security Update
Operating Systems: Windows Server (EPM server components)
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability is in the web interface component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the EPM server with credential theft leading to domain-wide lateral movement and privilege escalation across managed endpoints.

🟠

Likely Case

Credential harvesting from configuration files leading to limited lateral movement within the network and potential endpoint compromise.

🟢

If Mitigated

Limited information disclosure if proper network segmentation and access controls prevent lateral movement from compromised EPM server.

🌐 Internet-Facing: HIGH - Remote unauthenticated exploitation allows attackers to directly target exposed EPM instances without any authentication.
🏢 Internal Only: HIGH - Even internally accessible instances are vulnerable to any internal attacker or compromised internal host.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is trivial with publicly available proof-of-concept code. CISA has confirmed active exploitation in the wild.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: EPM 2024 January 2025 Security Update or EPM 2022 SU6 January 2025 Security Update

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6

Restart Required: Yes

Instructions:

1. Download the appropriate security update from Ivanti's support portal. 2. Backup your EPM database and configuration. 3. Apply the security update following Ivanti's installation guide. 4. Restart the EPM services or server as required.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to EPM servers to only trusted administrative networks

Web Application Firewall Rules

all

Implement WAF rules to block path traversal patterns in HTTP requests

🧯 If You Can't Patch

  • Immediately isolate EPM servers from internet access and restrict internal access to only necessary administrative networks
  • Implement strict monitoring and alerting for any access to EPM web interfaces and review logs for path traversal attempts

🔍 How to Verify

Check if Vulnerable:

Check EPM version in the web interface or via the EPM console. If version is before the January 2025 security updates, the system is vulnerable.

Check Version:

In EPM web interface: Navigate to Help > About. Or check the EPM installation directory for version information.

Verify Fix Applied:

Verify the installed version shows the January 2025 security update applied. Test with known exploit attempts to confirm they are blocked.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '../' patterns to EPM web interface
  • Access to sensitive file paths from unusual IP addresses
  • Failed authentication attempts followed by path traversal attempts

Network Indicators:

  • HTTP requests with encoded path traversal sequences to EPM ports (typically 443, 8443)
  • Unusual outbound connections from EPM server after exploitation

SIEM Query:

source="epm_web_logs" AND (uri="*..%2f*" OR uri="*../*" OR uri="*%2e%2e%2f*")

🔗 References

📤 Share & Export