CVE-2024-13159
Published: 14 January 2025
Summary
CVE-2024-13159 is a critical-severity Absolute Path Traversal (CWE-36) vulnerability in Ivanti Endpoint Manager. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Data from Local System (T1005); ranked in the top 0.1% of CVEs by exploit likelihood; CISA has added it to the Known Exploited Vulnerabilities catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely identification, reporting, and correction of the path traversal flaw in Ivanti EPM via vendor-provided patches in the January 2025 security updates.
Directly prevents absolute path traversal exploits by enforcing validation of externally provided file path inputs to restrict access to intended directories.
Boundary protection with web application firewalls or inspection proxies blocks remote unauthenticated path traversal payloads targeting vulnerable Ivanti EPM endpoints.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Absolute path traversal enables remote reading of local files for data collection (T1005) and file/directory discovery (T1083). UNC path coercion facilitates forced authentication (T1187). Unauthenticated remote vulnerability in public-facing application (T1190).
NVD Description
Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.
Deeper analysisAI
CVE-2024-13159 is an absolute path traversal vulnerability (CWE-36) in Ivanti Endpoint Manager (EPM) versions before the 2024 January-2025 Security Update and the 2022 SU6 January-2025 Security Update. Published on January 14, 2025, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), reflecting critical severity due to its network accessibility, low complexity, and lack of required privileges or user interaction.
A remote unauthenticated attacker can exploit this vulnerability to leak sensitive information from the affected EPM instances.
Ivanti's January 2025 security advisory provides patches via the specified security updates for EPM 2024 and EPM 2022 SU6 to remediate the issue. The vulnerability is also listed in the CISA Known Exploited Vulnerabilities Catalog, indicating active exploitation in the wild.
Horizon3.ai has published attack research on multiple credential coercion vulnerabilities in Ivanti Endpoint Manager, with relevance to this CVE.
Details
- CWE(s)
- KEV Date Added
- 10 March 2025