This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Ivanti EPM has a critical **Absolute Path Traversal** flaw.β¦
π‘οΈ **Root Cause**: **CWE-36** (Absolute Path Traversal). <br>π **Flaw**: Improper input validation in the **wildcard parameter** of the `GetHashForSingleFile` endpoint.
Q3Who is affected? (Versions/Components)
π’ **Affected**: **Ivanti Endpoint Manager (EPM)**. <br>π **Context**: Specifically noted in Jan 2025 advisory for **EPM 2024** and **EPM 2022 SU6**.
Q4What can hackers do? (Privileges/Data)
π **Attacker Actions**: <br>1. **Coerce NTLM auth** via remote UNC path. <br>2. **Steal credentials** (Machine Account). <br>3. **Exfiltrate sensitive data** from the server.
π£ **Public Exp?**: **YES**. <br>π **PoC**: Available via **ProjectDiscovery Nuclei** templates. <br>β οΈ **Risk**: Easy to automate and exploit widely.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: <br>1. Scan for **Ivanti EPM** endpoints. <br>2. Use **Nuclei** template for CVE-2024-13161. <br>3. Check for **wildcard parameter** exposure in `GetHashForSingleFile`.