AI description
CVE-2024-13159 is a credential coercion vulnerability found in Ivanti Endpoint Manager (EPM). It exists within the `GetHashForWildcardRecursive()` method of the `VulCore` class, located in the `WSVulnerabilityCore.dll` file. This method improperly validates user-supplied input, specifically the "wildcard" parameter. This oversight allows attackers to manipulate the wildcard parameter to construct a remote UNC path. Consequently, the EPM server is tricked into reading files from an attacker-specified directory. This vulnerability, along with three others (CVE-2024-10811, CVE-2024-13160, and CVE-2024-13161), can be exploited by unauthenticated attackers to potentially compromise the EPM server. Proof-of-concept exploit code has been publicly released, increasing the risk of attacks. These vulnerabilities were patched by Ivanti in January 2025. Users of affected EPM versions are strongly encouraged to apply the necessary updates.
- Description
- Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.
- Source
- 3c1d8aa1-5a33-4ea4-8992-aadd6440af75
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- Severity
- HIGH
Data from CISA
- Vulnerability name
- Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability
- Exploit added on
- Mar 10, 2025
- Exploit action due
- Mar 31, 2025
- Required action
- Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- 3c1d8aa1-5a33-4ea4-8992-aadd6440af75
- CWE-36
- Hype score
- Not currently trending
CISA Warns of Active Ivanti EPM Exploits – Patch Now! CISA flags three critical Ivanti Endpoint Manager (EPM) flaws as actively exploited (CVE-2024-13159, CVE-2024-13160, CVE-2024-13161), urging agencies to secure systems by March 31. Ivanti, used by 40,000 companies, has been a
@dCypherIO
12 Mar 2025
41 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA alerted U.S. federal agencies to secure networks against three critical Ivanti Endpoint Manager vulnerabilities (CVE-2024-13159, CVE-2024-13160, CVE-2024-13161) allowing remote attacks. Horizon3. ai reported these flaws, and Ivanti patched them in January. #Security #CISA h
@Strivehawk
11 Mar 2025
33 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
🔴 #CISA adds three #IvantiEPM vulnerabilities to its #KEV catalog. The flaws allow unauthenticated access to sensitive files, risking system compromise: CVE-2024-13159, CVE-2024-13160, CVE-2024-13161. Due date: March 31, 2025. Patch now! 🔗 Stay alert: https://t.co/NT7oUGvF1Z
@socradar
11 Mar 2025
16 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
KEV追加 •CVE-2025-25181 •CVE-2024-57968 •CVE-2024-13159 •CVE-2024-13160 •CVE-2024-13161
@Deer0nSecurity
10 Mar 2025
17 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️ CISA agregó tres vulnerabilidades de Ivanti Endpoint Manager (EPM), CVE-2024-13159, CVE-2024-13160 y CVE-2024-13161, a su catálogo de vulnerabilidades explotadas conocidas (KEV). Estas fallas permiten filtrar información confidencial de los sistemas. 🧉 https://t.co/y0ogZNZYF
@MarquisioX
10 Mar 2025
76 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
Latest Known Exploited Vulnerabilities (#KEV) : #CVE-2024-13159 #Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability https://t.co/JfzbmP3Jq7
@ScyScan
10 Mar 2025
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 ALERTĂ – Vulnerabilități critice în Ivanti 👀 🔓 Ivanti Connect Secure, Policy Secure și Endpoint Manager sunt afectate de vulnerabilități grave (CVE-2024-38657, CVE-2024-13159 și CVE-2025-22467), ce permit acces neautorizat, modificare de fișiere și execuție de cod malițios.
@DNSC_RO
3 Mar 2025
132 Impressions
3 Retweets
1 Like
2 Bookmarks
1 Reply
0 Quotes
PoC Released: CVE-2024-13159 (CVSS 9.8) in Ivanti EPM Poses Severe Security Threat https://t.co/HSLuL2lRfY POC released
@samilaiho
25 Feb 2025
509 Impressions
0 Retweets
3 Likes
1 Bookmark
0 Replies
0 Quotes
PoC Released: CVE-2024-13159 (CVSS 9.8) in Ivanti EPM Poses Severe Security Threat https://t.co/lPSxjmzvkv
@Dinosn
25 Feb 2025
2160 Impressions
7 Retweets
24 Likes
6 Bookmarks
0 Replies
0 Quotes
🛑 UPDATE: Researchers reveal tech details on credential coercion vulnerabilities (CVE-2024-13159-13161, 10811) in Ivanti EPM. Attackers could compromise servers via relay attacks. ⚡ Patch urgently if you haven’t done so already—PoC exploit now in the wild. https://t.co/YkjMNA3z
@achi_tech
24 Feb 2025
56 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🗣 PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159) https://t.co/NOiqusBR46
@fridaysecurity
24 Feb 2025
3 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
https://t.co/ZYzEf3Pq9G has unveiled four critical vulnerabilities in Ivanti EPM (CVE-2024-10811, CVE-2024-13161, CVE-2024-13160, CVE-2024-13159) with a CVSS score of 9.8. Major risk for server security 🌐💻 #Ivanti #Vulnerability #USA link: https://t.co/aXrPlEvX1n https://t.co/
@TweetThreatNews
20 Feb 2025
46 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛑 UPDATE: Researchers reveal tech details on credential coercion vulnerabilities (CVE-2024-13159-13161, 10811) in Ivanti EPM. Attackers could compromise servers via relay attacks. ⚡ Patch urgently if you haven’t done so already—PoC exploit now in the wild.… https://t.co/tRi7T5J
@TheHackersNews
20 Feb 2025
14077 Impressions
46 Retweets
102 Likes
16 Bookmarks
4 Replies
0 Quotes
Critical Path Traversal Vulnerabilities (CVE-2024-10811, CVE-2024-13161, CVE-2024-13160, and CVE-2024-13159) in Ivanti Endpoint Manager https://t.co/gQZPuZDaBu
@WhalersLtd
19 Jan 2025
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-13159 Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker … https://t.co/3qzlh1IsqY
@CVEnew
18 Jan 2025
283 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Multiples critical security flaws in Ivanti Endpoint Manager: - CVE-2024-10811 - CVE-2024-13161 - CVE-2024-13160 - CVE-2024-13159 The vulnerability is actively exploited in the wild and has been integrated into Patrowl. Our customers assets are protected. 🦉 #InfoSec https://t
@Patrowl_io
17 Jan 2025
33 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
#Ivanti: Researcher Uncovers Critical Vulnerabilities in Multiple Versions of Ivanti Endpoint Manager (#EPM) and Ivanti Avalanche Application Control Engine. CVE-2024-10811, CVE-2024-13161, CVE-2024-13160, CVE-2024-13159 have been patched - update! 👇 https://t.co/QH98ZOYgYO
@securestep9
16 Jan 2025
66 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ivanti:endpoint_manager:*:-:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "11BA6FEC-4862-4799-B8A1-9CEF9FE1B147",
"versionEndExcluding": "2022"
},
{
"criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "46580865-5177-4E55-BDAC-73DA4B472B35"
},
{
"criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "E57E12B5-B789-450C-9476-6C4C151E6993"
},
{
"criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2"
},
{
"criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF"
},
{
"criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "1877FB55-76BA-4714-ABB8-47258132F537"
},
{
"criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "4F9E8D45-5F12-4D45-A74E-C314FA3618A3"
},
{
"criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su6:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "5BB1FEE4-8B72-42A4-A7E1-DB3B10CE5CEE"
},
{
"criteria": "cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6C7283FE-C10A-4E37-B004-15FB0CAC49A5"
}
],
"operator": "OR"
}
]
}
]