CVE-2024-13168

7.5 HIGH

📋 TL;DR

An out-of-bounds write vulnerability in Ivanti Endpoint Manager (EPM) allows remote unauthenticated attackers to cause denial of service by crashing the service. This affects Ivanti EPM 2024 versions before the January 2025 security update and EPM 2022 SU6 versions before the January 2025 security update.

💻 Affected Systems

Products:
  • Ivanti Endpoint Manager (EPM)
Versions: EPM 2024 versions before January 2025 security update, EPM 2022 SU6 versions before January 2025 security update
Operating Systems: Windows Server (EPM server components)
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected Ivanti EPM versions are vulnerable. The vulnerability affects the EPM server/service components.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption of Ivanti EPM management infrastructure, preventing endpoint management and security operations across the organization.

🟠

Likely Case

Service crashes leading to temporary loss of endpoint management capabilities until service restart.

🟢

If Mitigated

Minimal impact with proper network segmentation and access controls preventing external exploitation.

🌐 Internet-Facing: HIGH - Remote unauthenticated exploitation allows attackers to disrupt service from anywhere on the internet.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could still exploit this vulnerability to disrupt endpoint management.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

The vulnerability requires crafting specific network requests to trigger the out-of-bounds write condition. No authentication is required for exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: EPM 2024 January 2025 Security Update, EPM 2022 SU6 January 2025 Security Update

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6

Restart Required: Yes

Instructions:

1. Download the appropriate security update from Ivanti's support portal. 2. Apply the update to all EPM servers. 3. Restart the EPM services. 4. Verify the update was successful by checking the version.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Ivanti EPM servers to only trusted management networks

Firewall Rules

all

Implement firewall rules to block external access to EPM service ports

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the EPM servers
  • Monitor EPM service health and implement automated restart procedures for service crashes

🔍 How to Verify

Check if Vulnerable:

Check Ivanti EPM version against affected versions listed in the security advisory

Check Version:

Check EPM console or server properties for version information

Verify Fix Applied:

Verify the installed version matches or exceeds the patched versions mentioned in the advisory

📡 Detection & Monitoring

Log Indicators:

  • EPM service crash events in Windows Event Logs
  • Unexpected service restarts
  • Access attempts from unusual sources

Network Indicators:

  • Unusual traffic patterns to EPM service ports
  • Multiple connection attempts followed by service unavailability

SIEM Query:

source="windows" AND (event_id=7034 OR event_id=1000) AND process_name="epm*" OR source="firewall" AND dest_port IN (EPM_service_ports) AND action="block"

🔗 References

📤 Share & Export