Cyber Posture

CVE-2024-13163

High

Published: 14 January 2025

Published
14 January 2025
Modified
11 July 2025
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.2647 96.4th percentile
Risk Priority 31 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-13163 is a high-severity Deserialization of Untrusted Data (CWE-502) vulnerability in Ivanti Endpoint Manager. Its CVSS base score is 7.8 (High).

Operationally, ranked in the top 3.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the deserialization of untrusted data vulnerability by requiring timely application of Ivanti's January 2025 security patches for EPM.

prevent

Prevents exploitation of CWE-502 by enforcing validation and error handling of untrusted input data prior to deserialization.

prevent

Mitigates remote code execution from deserialization exploits through memory protections like DEP and ASLR.

NVD Description

Deserialization of untrusted data in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to achieve remote code execution. Local user interaction is required.

Deeper analysisAI

CVE-2024-13163 is a deserialization of untrusted data vulnerability (CWE-502) in Ivanti Endpoint Manager (EPM) versions prior to the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update. Published on January 14, 2025, it carries a CVSS v3.1 base score of 7.8 (High: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), indicating potential for high confidentiality, integrity, and availability impacts through improper handling of untrusted data.

A remote unauthenticated attacker can exploit this vulnerability to achieve remote code execution on affected systems. Exploitation requires local user interaction, with a low attack complexity and no privileges needed from the attacker.

Ivanti's security advisory for EPM January 2025 addresses this issue through patches for EPM 2024 and EPM 2022 SU6. Practitioners should apply these updates and consult the official advisory at https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6 for detailed mitigation guidance.

Details

CWE(s)

Affected Products

ivanti
endpoint manager
2022, 2024 · ≤ 2022

CVEs Like This One

CVE-2025-13659Same product: Ivanti Endpoint Manager
CVE-2024-13171Same product: Ivanti Endpoint Manager
CVE-2025-9713Same product: Ivanti Endpoint Manager
CVE-2024-13160Same product: Ivanti Endpoint Manager
CVE-2025-9712Same product: Ivanti Endpoint Manager
CVE-2024-13167Same product: Ivanti Endpoint Manager
CVE-2024-13158Same product: Ivanti Endpoint Manager
CVE-2024-10811Same product: Ivanti Endpoint Manager
CVE-2024-13166Same product: Ivanti Endpoint Manager
CVE-2025-9872Same product: Ivanti Endpoint Manager

References