Vulnerability Details : CVE-2024-13160
Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.
Vulnerability category: Directory traversal
Products affected by CVE-2024-13160
- cpe:2.3:a:ivanti:endpoint_manager:*:-:*:*:*:*:*:*
- cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*
- cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*
- cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*
- cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*
- cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*
- cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*
- cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*
- cpe:2.3:a:ivanti:endpoint_manager:2022:su2*:*:*:*:*:*
- cpe:2.3:a:ivanti:endpoint_manager:2024:*:*:*:*:*:*:*
- cpe:2.3:a:ivanti:endpoint_manager:2022:su6:*:*:*:*:*:*
CVE-2024-13160 is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability
CISA required action:
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
CISA description:
Ivanti Endpoint Manager (EPM) contains an absolute path traversal vulnerability that allows a remote unauthenticated attacker to leak sensitive information.
Notes:
https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2024-13160
Added on
2025-03-10
Action due date
2025-03-31
Exploit prediction scoring system (EPSS) score for CVE-2024-13160
90.70%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2024-13160
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
ivanti | 2025-01-14 |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST | 2025-03-13 |
CWE ids for CVE-2024-13160
-
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize absolute path sequences such as "/abs/path" that can resolve to a location that is outside of that directory.Assigned by: 3c1d8aa1-5a33-4ea4-8992-aadd6440af75 (Secondary)
References for CVE-2024-13160
-
https://www.horizon3.ai/attack-research/attack-blogs/ivanti-endpoint-manager-multiple-credential-coercion-vulnerabilities/
Exploit;Third Party Advisory
-
https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6
Security Advisory EPM January 2025 for EPM 2024 and EPM 2022 SU6Vendor Advisory
Jump to