CVE-2024-13161

9.8 CRITICAL CISA KEV

📋 TL;DR

This vulnerability allows remote unauthenticated attackers to perform absolute path traversal attacks on Ivanti Endpoint Manager (EPM) systems, potentially leaking sensitive information like credentials and configuration files. It affects all Ivanti EPM deployments before the January 2025 security updates.

💻 Affected Systems

Products:
  • Ivanti Endpoint Manager
Versions: EPM 2024 before January 2025 Security Update, EPM 2022 SU6 before January 2025 Security Update
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. The EPM server component is affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through credential theft leading to domain takeover, lateral movement, and data exfiltration.

🟠

Likely Case

Sensitive information disclosure including administrative credentials, configuration files, and system information that enables further attacks.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing external access to EPM interfaces.

🌐 Internet-Facing: HIGH - Remote unauthenticated exploitation makes internet-facing systems extremely vulnerable.
🏢 Internal Only: HIGH - Even internal systems are vulnerable to network-accessible attackers without authentication.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is trivial with public proof-of-concept code available. CISA confirms active exploitation in the wild.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: EPM 2024 January 2025 Security Update, EPM 2022 SU6 January 2025 Security Update

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6

Restart Required: Yes

Instructions:

1. Download the security update from Ivanti portal. 2. Apply the update to all EPM servers. 3. Restart the EPM services. 4. Verify the patch is applied successfully.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to EPM servers to only trusted administrative networks

Firewall Rules

all

Block external access to EPM web interfaces and management ports

🧯 If You Can't Patch

  • Immediately isolate EPM servers from internet and untrusted networks
  • Implement strict network access controls and monitor for suspicious file access patterns

🔍 How to Verify

Check if Vulnerable:

Check EPM version against affected versions. Test with path traversal payloads to sensitive files.

Check Version:

Check EPM console or server properties for version information

Verify Fix Applied:

Verify EPM version shows the January 2025 security update applied. Test that path traversal attempts now fail.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in EPM logs
  • Multiple failed path traversal attempts
  • Access to sensitive configuration files

Network Indicators:

  • HTTP requests with ../ patterns to EPM servers
  • Unusual outbound connections from EPM servers

SIEM Query:

source="epm_logs" AND ("..\\" OR "../" OR "absolute path")

🔗 References

📤 Share & Export