CVE-2024-13161

CRITICAL
2025-01-14 3c1d8aa1-5a33-4ea4-8992-aadd6440af75
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 28, 2026 - 18:03 vuln.today
Added to CISA KEV
Oct 24, 2025 - 14:48 cisa
CISA KEV
PoC Detected
Oct 24, 2025 - 14:48 vuln.today
Public exploit code
CVE Published
Jan 14, 2025 - 18:15 nvd
CRITICAL 9.8

Description

Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.

Analysis

Ivanti Endpoint Manager contains a third absolute path traversal vulnerability for unauthenticated information disclosure, completing the triple path traversal set in the January 2025 security update.

Technical Context

The CWE-36 absolute path traversal through a third distinct code path enables the same unauthenticated file reading capability as its companion CVEs.

Affected Products

['Ivanti EPM before 2024 January-2025 Security Update']

Remediation

Apply Ivanti EPM January 2025 security update. All three CVEs are addressed in the same patch. Conduct a thorough security review of the EPM deployment.

Priority Score

212
Low Medium High Critical
KEV: +50
EPSS: +92.5
CVSS: +49
POC: +20

Share

CVE-2024-13161 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy