Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-13161 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Ivanti EPM has a critical **Absolute Path Traversal** flaw.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-36** (Absolute Path Traversal). <br>πŸ” **Flaw**: Improper input validation in the **wildcard parameter** of the `GetHashForSingleFile` endpoint.

Q3Who is affected? (Versions/Components)

🏒 **Affected**: **Ivanti Endpoint Manager (EPM)**. <br>πŸ“… **Context**: Specifically noted in Jan 2025 advisory for **EPM 2024** and **EPM 2022 SU6**.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Actions**: <br>1. **Coerce NTLM auth** via remote UNC path. <br>2. **Steal credentials** (Machine Account). <br>3. **Exfiltrate sensitive data** from the server.

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Threshold**: **LOW**. <br>πŸ”“ **Auth**: **Unauthenticated** (No login needed). <br>🌐 **Access**: Network vector (AV:N), Low Complexity (AC:L).

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ’£ **Public Exp?**: **YES**. <br>πŸ“‚ **PoC**: Available via **ProjectDiscovery Nuclei** templates. <br>⚠️ **Risk**: Easy to automate and exploit widely.

Q7How to self-check? (Features/Scanning)

πŸ”Ž **Self-Check**: <br>1. Scan for **Ivanti EPM** endpoints. <br>2. Use **Nuclei** template for CVE-2024-13161. <br>3. Check for **wildcard parameter** exposure in `GetHashForSingleFile`.

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Official Fix**: **YES**. <br>πŸ“ **Advisory**: Ivanti released security advisory in **Jan 2025**. <br>βœ… **Action**: Update to the latest secure version immediately.

Q9What if no patch? (Workaround)

🚧 **No Patch?**: <br>1. **Block** external access to EPM endpoints. <br>2. **Restrict** NTLM authentication protocols. <br>3. **Monitor** for suspicious UNC path requests.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. <br>⏱️ **Priority**: **P0**. <br>πŸš€ **Reason**: Unauthenticated, remote, high CVSS score, and active PoC exists. Patch NOW.