First published: Tue Jan 14 2025(Updated: )
Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.
Credit: 3c1d8aa1-5a33-4ea4-8992-aadd6440af75
Affected Software | Affected Version | How to fix |
---|---|---|
Ivanti Endpoint Manager (EPM) | <2024 January-2025 Security Update<2022 SU6 January-2025 Security Update |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The severity of CVE-2024-13159 is considered high due to its ability to allow remote unauthenticated attackers to leak sensitive information.
To fix CVE-2024-13159, users must upgrade to the Ivanti EPM version released after January 2024 or the January 2022 SU6 Security Update.
CVE-2024-13159 can be exploited through absolute path traversal attacks, enabling attackers to access unauthorized files.
Organizations using Ivanti Endpoint Manager (EPM) versions prior to the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update are affected by CVE-2024-13159.
CVE-2024-13159 puts sensitive information at risk, as attackers may gain access to system files and configurations through path traversal.