Path Traversal Vulnerability in Ivanti Endpoint Manager Products
CVE-2024-13159
Key Information:
- Vendor
- Ivanti
- Status
- Vendor
- CVE Published:
- 14 January 2025
Badges
What is CVE-2024-13159?
CVE-2024-13159 is a significant vulnerability affecting Ivanti Endpoint Manager products, which are designed to streamline device management and enhance security across organizational networks. This particular flaw, categorized as an absolute path traversal vulnerability, allows remote unauthenticated attackers to access sensitive information. Such exploitation could lead to unauthorized data exposure, significantly jeopardizing the confidentiality of crucial organizational data and undermining overall cybersecurity measures.
Technical Details
The vulnerability resides in Ivanti Endpoint Manager prior to the January 2025 security update and in the 2022 SU6 January security update. It enables an attacker to manipulate the file paths used by the application, allowing them to access files and directories outside of the intended scope of the application. This exploitation can occur without requiring any authentication, making it particularly dangerous.
Potential Impact of CVE-2024-13159
-
Data Leakage: The most immediate concern is the potential for sensitive data leakage. Unauthorized access to files can lead to exposure of confidential information, including personal identifiable information (PII), intellectual property, and other critical organizational assets.
-
Regulatory Non-compliance: Organizations may face regulatory repercussions due to inadequate protection of sensitive data. Data breaches can result in fines and loss of customer trust, especially for businesses required to adhere to regulations like GDPR or HIPAA.
-
Increased Attack Surface: The existence of this vulnerability enhances the overall attack surface for organizations, increasing their susceptibility to further attacks. If attackers successfully exploit this flaw, they may pave the way for additional compromises within the network, potentially leading to extensive damage or disruption.
Affected Version(s)
Endpoint Manager 2024 January-2025 Security Update
Endpoint Manager 2024 January-2025 Security Update
Endpoint Manager 2022 SU6 January-2025 Security Update
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published