CVE-2024-13166

7.5 HIGH

📋 TL;DR

An out-of-bounds write vulnerability in Ivanti Endpoint Manager (EPM) allows remote unauthenticated attackers to cause denial of service by crashing the service. This affects Ivanti EPM 2024 and 2022 SU6 versions before the January 2025 security updates. Organizations using these vulnerable versions are at risk.

💻 Affected Systems

Products:
  • Ivanti Endpoint Manager
Versions: EPM 2024 versions before January 2025 Security Update, EPM 2022 SU6 versions before January 2025 Security Update
Operating Systems: Windows Server (EPM server components), Windows (EPM agent components)
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable. Both server and agent components may be affected depending on attack vector.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption of Ivanti EPM management capabilities, preventing endpoint management and potentially requiring manual service restoration.

🟠

Likely Case

Temporary denial of service affecting EPM console and agent communications until service restart.

🟢

If Mitigated

Minimal impact with proper network segmentation and updated systems.

🌐 Internet-Facing: HIGH - Remote unauthenticated exploitation allows attackers to disrupt service from anywhere.
🏢 Internal Only: HIGH - Even internally, unauthenticated access means any compromised internal system could trigger the DoS.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

CWE-787 out-of-bounds write vulnerabilities typically require specific memory manipulation knowledge but unauthenticated access lowers barrier.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024 January-2025 Security Update for EPM 2024, 2022 SU6 January-2025 Security Update for EPM 2022 SU6

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6

Restart Required: Yes

Instructions:

1. Download the appropriate security update from Ivanti support portal. 2. Apply update to EPM server first. 3. Update EPM agents through console. 4. Restart EPM services. 5. Verify all components show updated versions.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to EPM servers to only trusted management networks and required agent communication ports.

Use firewall rules to limit inbound connections to EPM servers from authorized IP ranges only

Service Monitoring

windows

Implement aggressive service monitoring and automatic restart for EPM services to minimize downtime.

Configure monitoring tools to alert on EPM service crashes and automatically restart services

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure to EPM servers
  • Deploy additional monitoring for service crashes and establish rapid response procedures

🔍 How to Verify

Check if Vulnerable:

Check EPM console version under Help > About. If version is before January 2025 security update, system is vulnerable.

Check Version:

In EPM console: Help > About displays version information

Verify Fix Applied:

Verify version shows January 2025 security update applied and test EPM functionality remains operational.

📡 Detection & Monitoring

Log Indicators:

  • EPM service crash events in Windows Event Logs
  • Unexpected service termination logs
  • Increased error rates in EPM application logs

Network Indicators:

  • Unusual traffic patterns to EPM ports (typically 443, 8443)
  • Multiple connection attempts from single sources

SIEM Query:

source="windows" AND (event_id=7034 OR event_id=1000) AND process_name="epm*" OR source="ivanti_epm" AND (message="crash" OR message="terminated")

🔗 References

📤 Share & Export