CVE-2024-13166
Published: 14 January 2025
Summary
CVE-2024-13166 is a high-severity Out-of-bounds Write (CWE-787) vulnerability in Ivanti Endpoint Manager. Its CVSS base score is 7.5 (High).
Operationally, ranked in the top 15.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires timely remediation of software flaws like this out-of-bounds write vulnerability through application of vendor security patches.
Implements memory protection mechanisms such as address space layout randomization and stack guards to prevent exploitation of out-of-bounds writes leading to crashes.
Enforces validation of incoming data to block malformed inputs that could trigger the out-of-bounds write in Ivanti EPM.
NVD Description
An out-of-bounds write in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to cause a denial of service.
Deeper analysisAI
CVE-2024-13166 is an out-of-bounds write vulnerability (CWE-787) in Ivanti Endpoint Manager (EPM) versions prior to the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update. Published on January 14, 2025, the flaw carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), reflecting high severity due to its potential for significant availability impact with low attack complexity.
A remote unauthenticated attacker can exploit this vulnerability over the network without privileges or user interaction, resulting in a denial of service that disrupts EPM functionality. The attack leverages the out-of-bounds write to crash the service, with no demonstrated impact on confidentiality or integrity.
Ivanti's security advisory details mitigation through the January-2025 Security Updates for EPM 2024 and EPM 2022 SU6, available at https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6. Practitioners should apply these patches promptly to affected deployments.
Details
- CWE(s)