Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-13169 (GCVE-0-2024-13169)
Vulnerability from cvelistv5 – Published: 2025-01-14 17:18 – Updated: 2026-02-26 19:09| Vendor | Product | Version | ||
|---|---|---|---|---|
| Ivanti | Endpoint Manager |
Unaffected:
2024 January-2025 Security Update
(custom)
Unaffected: 2022 SU6 January-2025 Security Update (custom) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-13169",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-24T04:55:55.330675Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-26T19:09:28.733Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "Endpoint Manager",
"vendor": "Ivanti",
"versions": [
{
"status": "unaffected",
"version": "2024 January-2025 Security Update",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "2022 SU6 January-2025 Security Update",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAn out-of-bounds read in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a local authenticated attacker to escalate their privileges.\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;\u003c/span\u003e"
}
],
"value": "An out-of-bounds read in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a local authenticated attacker to escalate their privileges."
}
],
"impacts": [
{
"capecId": "CAPEC-233",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-233 Privilege Escalation"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-125",
"description": "CWE-125 Out-of-bounds Read",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-843",
"description": "CWE-843 Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-01-14T17:18:28.069Z",
"orgId": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"shortName": "ivanti"
},
"references": [
{
"url": "https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"assignerShortName": "ivanti",
"cveId": "CVE-2024-13169",
"datePublished": "2025-01-14T17:18:28.069Z",
"dateReserved": "2025-01-07T02:28:56.274Z",
"dateUpdated": "2026-02-26T19:09:28.733Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2024-13169\",\"sourceIdentifier\":\"3c1d8aa1-5a33-4ea4-8992-aadd6440af75\",\"published\":\"2025-01-14T18:15:28.557\",\"lastModified\":\"2025-07-11T17:33:56.197\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An out-of-bounds read in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a local authenticated attacker to escalate their privileges.\"},{\"lang\":\"es\",\"value\":\"Una lectura fuera de los l\u00edmites en Ivanti EPM antes de la actualizaci\u00f3n de seguridad de enero de 2024-2025 y la actualizaci\u00f3n de seguridad de enero de 2022 SU6 permite que un atacante autenticado local escale sus privilegios.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"3c1d8aa1-5a33-4ea4-8992-aadd6440af75\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"3c1d8aa1-5a33-4ea4-8992-aadd6440af75\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"},{\"lang\":\"en\",\"value\":\"CWE-843\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2022\",\"matchCriteriaId\":\"B1F6549B-CF5D-4607-B67D-5489905A1705\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"46580865-5177-4E55-BDAC-73DA4B472B35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E57E12B5-B789-450C-9476-6C4C151E6993\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*\",\"matchCriteriaId\":\"10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*\",\"matchCriteriaId\":\"1877FB55-76BA-4714-ABB8-47258132F537\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F9E8D45-5F12-4D45-A74E-C314FA3618A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C7283FE-C10A-4E37-B004-15FB0CAC49A5\"}]}]}],\"references\":[{\"url\":\"https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6\",\"source\":\"3c1d8aa1-5a33-4ea4-8992-aadd6440af75\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-13169\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-01-24T04:55:55.330675Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-01-16T21:17:43.901Z\"}}], \"cna\": {\"source\": {\"discovery\": \"UNKNOWN\"}, \"impacts\": [{\"capecId\": \"CAPEC-233\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-233 Privilege Escalation\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Ivanti\", \"product\": \"Endpoint Manager\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"2024 January-2025 Security Update\", \"versionType\": \"custom\"}, {\"status\": \"unaffected\", \"version\": \"2022 SU6 January-2025 Security Update\", \"versionType\": \"custom\"}], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"An out-of-bounds read in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a local authenticated attacker to escalate their privileges.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eAn out-of-bounds read in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a local authenticated attacker to escalate their privileges.\u003c/span\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e\u0026nbsp;\u003c/span\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-125\", \"description\": \"CWE-125 Out-of-bounds Read\"}]}, {\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-843\", \"description\": \"CWE-843 Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"3c1d8aa1-5a33-4ea4-8992-aadd6440af75\", \"shortName\": \"ivanti\", \"dateUpdated\": \"2025-01-14T17:18:28.069Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-13169\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-02-26T19:09:28.733Z\", \"dateReserved\": \"2025-01-07T02:28:56.274Z\", \"assignerOrgId\": \"3c1d8aa1-5a33-4ea4-8992-aadd6440af75\", \"datePublished\": \"2025-01-14T17:18:28.069Z\", \"assignerShortName\": \"ivanti\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
CERTFR-2025-AVI-0035
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Ivanti Endpoint Manager (EPM). Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Ivanti | Endpoint Manager (EPM) | Endpoint Manager (EPM) 2024 sans le correctif de sécurité de janvier 2025 | ||
| Ivanti | Endpoint Manager (EPM) | Endpoint Manager (EPM) 2022 versions antérieures à SU6 sans le correctif de sécurité de janvier 2025 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Endpoint Manager (EPM) 2024 sans le correctif de s\u00e9curit\u00e9 de janvier 2025 ",
"product": {
"name": "Endpoint Manager (EPM)",
"vendor": {
"name": "Ivanti",
"scada": false
}
}
},
{
"description": "Endpoint Manager (EPM) 2022 versions ant\u00e9rieures \u00e0 SU6 sans le correctif de s\u00e9curit\u00e9 de janvier 2025 ",
"product": {
"name": "Endpoint Manager (EPM)",
"vendor": {
"name": "Ivanti",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-13168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13168"
},
{
"name": "CVE-2024-13171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13171"
},
{
"name": "CVE-2024-13166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13166"
},
{
"name": "CVE-2024-13165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13165"
},
{
"name": "CVE-2024-32848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32848"
},
{
"name": "CVE-2024-13164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13164"
},
{
"name": "CVE-2024-13160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13160"
},
{
"name": "CVE-2024-13172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13172"
},
{
"name": "CVE-2024-13167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13167"
},
{
"name": "CVE-2024-13162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13162"
},
{
"name": "CVE-2024-13161",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13161"
},
{
"name": "CVE-2024-13170",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13170"
},
{
"name": "CVE-2024-13158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13158"
},
{
"name": "CVE-2024-13169",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13169"
},
{
"name": "CVE-2024-13163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13163"
},
{
"name": "CVE-2024-10811",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10811"
},
{
"name": "CVE-2024-13159",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13159"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0035",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-01-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Ivanti Endpoint Manager (EPM). Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Ivanti Endpoint Manager (EPM)",
"vendor_advisories": [
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Ivanti january-security-update",
"url": "https://www.ivanti.com/blog/january-security-update"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Ivanti Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6",
"url": "https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6"
}
]
}
CERTFR-2025-AVI-0035
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Ivanti Endpoint Manager (EPM). Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Ivanti | Endpoint Manager (EPM) | Endpoint Manager (EPM) 2024 sans le correctif de sécurité de janvier 2025 | ||
| Ivanti | Endpoint Manager (EPM) | Endpoint Manager (EPM) 2022 versions antérieures à SU6 sans le correctif de sécurité de janvier 2025 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Endpoint Manager (EPM) 2024 sans le correctif de s\u00e9curit\u00e9 de janvier 2025 ",
"product": {
"name": "Endpoint Manager (EPM)",
"vendor": {
"name": "Ivanti",
"scada": false
}
}
},
{
"description": "Endpoint Manager (EPM) 2022 versions ant\u00e9rieures \u00e0 SU6 sans le correctif de s\u00e9curit\u00e9 de janvier 2025 ",
"product": {
"name": "Endpoint Manager (EPM)",
"vendor": {
"name": "Ivanti",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-13168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13168"
},
{
"name": "CVE-2024-13171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13171"
},
{
"name": "CVE-2024-13166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13166"
},
{
"name": "CVE-2024-13165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13165"
},
{
"name": "CVE-2024-32848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32848"
},
{
"name": "CVE-2024-13164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13164"
},
{
"name": "CVE-2024-13160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13160"
},
{
"name": "CVE-2024-13172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13172"
},
{
"name": "CVE-2024-13167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13167"
},
{
"name": "CVE-2024-13162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13162"
},
{
"name": "CVE-2024-13161",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13161"
},
{
"name": "CVE-2024-13170",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13170"
},
{
"name": "CVE-2024-13158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13158"
},
{
"name": "CVE-2024-13169",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13169"
},
{
"name": "CVE-2024-13163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13163"
},
{
"name": "CVE-2024-10811",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10811"
},
{
"name": "CVE-2024-13159",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13159"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0035",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-01-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Ivanti Endpoint Manager (EPM). Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Ivanti Endpoint Manager (EPM)",
"vendor_advisories": [
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Ivanti january-security-update",
"url": "https://www.ivanti.com/blog/january-security-update"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Ivanti Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6",
"url": "https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6"
}
]
}
BDU:2025-00396
Vulnerability from fstec - Published: 13.01.2025{
"CVSS 2.0": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Ivanti",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u0434\u043e 2024 January-2025 Security Update (Ivanti Endpoint Manager), \u0434\u043e SU6 January-2025 Security Update (Ivanti Endpoint Manager)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0423\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0438\u0437 \u0434\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u0445 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u043e\u0432. \u0412 \u0441\u0432\u044f\u0437\u0438 \u0441\u043e \u0441\u043b\u043e\u0436\u0438\u0432\u0448\u0435\u0439\u0441\u044f \u043e\u0431\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u043e\u0439 \u0438 \u0432\u0432\u0435\u0434\u0435\u043d\u043d\u044b\u043c\u0438 \u0441\u0430\u043d\u043a\u0446\u0438\u044f\u043c\u0438 \u043f\u0440\u043e\u0442\u0438\u0432 \u0420\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u043e\u0439 \u0424\u0435\u0434\u0435\u0440\u0430\u0446\u0438\u0438 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u0443\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0442\u043e\u043b\u044c\u043a\u043e \u043f\u043e\u0441\u043b\u0435 \u043e\u0446\u0435\u043d\u043a\u0438 \u0432\u0441\u0435\u0445 \u0441\u043e\u043f\u0443\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0445 \u0440\u0438\u0441\u043a\u043e\u0432. \n\n\u041a\u043e\u043c\u043f\u0435\u043d\u0441\u0438\u0440\u0443\u044e\u0449\u0438\u0435 \u043c\u0435\u0440\u044b:\n- \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u043c \u0438\u0437 \u0432\u043d\u0435\u0448\u043d\u0438\u0445 \u0441\u0435\u0442\u0435\u0439 (\u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442);\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432 \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u044d\u043a\u0440\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0434\u043b\u044f \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u0438 \u0431\u0435\u0441\u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c\u043d\u043e\u0439 \u043e\u0442\u043f\u0440\u0430\u0432\u043a\u0438 \u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432 \u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u043c\u0443 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u043c\u0443 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044e;\n - \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0438 \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0449\u0435\u043d\u0438\u044f \u0432\u0442\u043e\u0440\u0436\u0435\u043d\u0438\u0439 (IDS/IPS) \u0434\u043b\u044f \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u043d\u0438\u044f \u043f\u043e\u043f\u044b\u0442\u043e\u043a \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438.\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\nhttps://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "13.01.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "17.01.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "17.01.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-00396",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2024-13169",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Ivanti Endpoint Manager",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043a\u043e\u043d\u0435\u0447\u043d\u044b\u043c\u0438 \u0442\u043e\u0447\u043a\u0430\u043c\u0438 Ivanti EPM, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u0447\u0442\u0435\u043d\u0438\u0435\u043c \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u043f\u0430\u043c\u044f\u0442\u0438, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0427\u0442\u0435\u043d\u0438\u0435 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u0431\u0443\u0444\u0435\u0440\u0430 (CWE-125), \u0414\u043e\u0441\u0442\u0443\u043f \u043a \u0440\u0435\u0441\u0443\u0440\u0441\u0443 \u0447\u0435\u0440\u0435\u0437 \u043d\u0435\u0441\u043e\u0432\u043c\u0435\u0441\u0442\u0438\u043c\u044b\u0435 \u0442\u0438\u043f\u044b (CWE-843)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043a\u043e\u043d\u0435\u0447\u043d\u044b\u043c\u0438 \u0442\u043e\u0447\u043a\u0430\u043c\u0438 Ivanti EPM \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0447\u0442\u0435\u043d\u0438\u0435\u043c \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u043f\u0430\u043c\u044f\u0442\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": "\u042d\u0442\u0430 CVE \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u0435\u0442 \u043d\u0435\u043f\u043e\u043b\u043d\u044b\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u0437 CVE-2024-32848",
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-125, CWE-843",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,2)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,8)"
}
NCSC-2025-0017
Vulnerability from csaf_ncscnl - Published: 2025-01-15 11:59 - Updated: 2025-01-15 11:59{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Ivanti heeft kwetsbaarheden verholpen in Ivanti Endpoint Manager (EPM) die aanwezig waren in versies v\u00f3\u00f3r de januari 2025 beveiligingsupdates.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden omvatten path traversal, SQL-injectie, deserialisatie, onjuist bestandsnaamvalidatie en onvoldoende validatie van handtekeningen. Deze kwetsbaarheden stellen zowel ongeauthenticeerde als geauthenticeerde aanvallers in staat om toegang te krijgen tot gevoelige informatie, code op afstand uit te voeren, en kunnen leiden tot een Denial-of-Service.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Ivanti heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "general",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "Improper Verification of Cryptographic Signature",
"title": "CWE-347"
},
{
"category": "general",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
},
{
"category": "general",
"text": "Absolute Path Traversal",
"title": "CWE-36"
},
{
"category": "general",
"text": "Untrusted Search Path",
"title": "CWE-426"
},
{
"category": "general",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
},
{
"category": "general",
"text": "Unrestricted Upload of File with Dangerous Type",
"title": "CWE-434"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)",
"title": "CWE-89"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd",
"url": "https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6"
}
],
"title": "Kwetsbaarheden verholpen in Ivanti Endpoint Manager",
"tracking": {
"current_release_date": "2025-01-15T11:59:32.488132Z",
"id": "NCSC-2025-0017",
"initial_release_date": "2025-01-15T11:59:32.488132Z",
"revision_history": [
{
"date": "2025-01-15T11:59:32.488132Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "endpoint_manager",
"product": {
"name": "endpoint_manager",
"product_id": "CSAFPID-161069",
"product_identification_helper": {
"cpe": "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "endpoint_manager",
"product": {
"name": "endpoint_manager",
"product_id": "CSAFPID-161070",
"product_identification_helper": {
"cpe": "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "endpoint_manager",
"product": {
"name": "endpoint_manager",
"product_id": "CSAFPID-161071",
"product_identification_helper": {
"cpe": "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "endpoint_manager",
"product": {
"name": "endpoint_manager",
"product_id": "CSAFPID-161072",
"product_identification_helper": {
"cpe": "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "endpoint_manager",
"product": {
"name": "endpoint_manager",
"product_id": "CSAFPID-161073",
"product_identification_helper": {
"cpe": "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "endpoint_manager",
"product": {
"name": "endpoint_manager",
"product_id": "CSAFPID-793256",
"product_identification_helper": {
"cpe": "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "endpoint_manager",
"product": {
"name": "endpoint_manager",
"product_id": "CSAFPID-1638556",
"product_identification_helper": {
"cpe": "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "endpoint_manager",
"product": {
"name": "endpoint_manager",
"product_id": "CSAFPID-1512661",
"product_identification_helper": {
"cpe": "cpe:2.3:a:ivanti:endpoint_manager:2024:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "endpoint_manager",
"product": {
"name": "endpoint_manager",
"product_id": "CSAFPID-1640375",
"product_identification_helper": {
"cpe": "cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "epm",
"product": {
"name": "epm",
"product_id": "CSAFPID-1639440",
"product_identification_helper": {
"cpe": "cpe:2.3:a:ivanti:epm:2022_su6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "epm",
"product": {
"name": "epm",
"product_id": "CSAFPID-1639439",
"product_identification_helper": {
"cpe": "cpe:2.3:a:ivanti:epm:2024_september_security_update:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ivanti_endpoint_manager__2022_su6",
"product": {
"name": "ivanti_endpoint_manager__2022_su6",
"product_id": "CSAFPID-1638733",
"product_identification_helper": {
"cpe": "cpe:2.3:a:ivanti:ivanti_endpoint_manager__2022_su6:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ivanti_endpoint_manager__2024_security_patch",
"product": {
"name": "ivanti_endpoint_manager__2024_security_patch",
"product_id": "CSAFPID-1638735",
"product_identification_helper": {
"cpe": "cpe:2.3:a:ivanti:ivanti_endpoint_manager__2024_security_patch:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ivanti_endpoint_manager__2024_su1",
"product": {
"name": "ivanti_endpoint_manager__2024_su1",
"product_id": "CSAFPID-1638734",
"product_identification_helper": {
"cpe": "cpe:2.3:a:ivanti:ivanti_endpoint_manager__2024_su1:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "ivanti"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-10811",
"cwe": {
"id": "CWE-36",
"name": "Absolute Path Traversal"
},
"notes": [
{
"category": "other",
"text": "Absolute Path Traversal",
"title": "CWE-36"
}
],
"product_status": {
"known_affected": [
"CSAFPID-161069"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-10811",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-10811.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-161069"
]
}
],
"title": "CVE-2024-10811"
},
{
"cve": "CVE-2024-13158",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "other",
"text": "Untrusted Search Path",
"title": "CWE-426"
}
],
"product_status": {
"known_affected": [
"CSAFPID-161069"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-13158",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-13158.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-161069"
]
}
],
"title": "CVE-2024-13158"
},
{
"cve": "CVE-2024-13159",
"cwe": {
"id": "CWE-36",
"name": "Absolute Path Traversal"
},
"notes": [
{
"category": "other",
"text": "Absolute Path Traversal",
"title": "CWE-36"
}
],
"product_status": {
"known_affected": [
"CSAFPID-161069"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-13159",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-13159.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-161069"
]
}
],
"title": "CVE-2024-13159"
},
{
"cve": "CVE-2024-13160",
"cwe": {
"id": "CWE-36",
"name": "Absolute Path Traversal"
},
"notes": [
{
"category": "other",
"text": "Absolute Path Traversal",
"title": "CWE-36"
}
],
"product_status": {
"known_affected": [
"CSAFPID-161069"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-13160",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-13160.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-161069"
]
}
],
"title": "CVE-2024-13160"
},
{
"cve": "CVE-2024-13161",
"cwe": {
"id": "CWE-36",
"name": "Absolute Path Traversal"
},
"notes": [
{
"category": "other",
"text": "Absolute Path Traversal",
"title": "CWE-36"
}
],
"product_status": {
"known_affected": [
"CSAFPID-161069"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-13161",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-13161.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-161069"
]
}
],
"title": "CVE-2024-13161"
},
{
"cve": "CVE-2024-13162",
"cwe": {
"id": "CWE-89",
"name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)",
"title": "CWE-89"
}
],
"product_status": {
"known_affected": [
"CSAFPID-161069"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-13162",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-13162.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-161069"
]
}
],
"title": "CVE-2024-13162"
},
{
"cve": "CVE-2024-13163",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-161069"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-13163",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-13163.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-161069"
]
}
],
"title": "CVE-2024-13163"
},
{
"cve": "CVE-2024-13164",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "other",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
}
],
"product_status": {
"known_affected": [
"CSAFPID-161069"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-13164",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-13164.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-161069"
]
}
],
"title": "CVE-2024-13164"
},
{
"cve": "CVE-2024-13165",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-161069"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-13165",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-13165.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-161069"
]
}
],
"title": "CVE-2024-13165"
},
{
"cve": "CVE-2024-13166",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-161069"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-13166",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-13166.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-161069"
]
}
],
"title": "CVE-2024-13166"
},
{
"cve": "CVE-2024-13167",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-161069"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-13167",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-13167.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-161069"
]
}
],
"title": "CVE-2024-13167"
},
{
"cve": "CVE-2024-13168",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-161069"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-13168",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-13168.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-161069"
]
}
],
"title": "CVE-2024-13168"
},
{
"cve": "CVE-2024-13169",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-161069"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-13169",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-13169.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-161069"
]
}
],
"title": "CVE-2024-13169"
},
{
"cve": "CVE-2024-13170",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-161069"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-13170",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-13170.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-161069"
]
}
],
"title": "CVE-2024-13170"
},
{
"cve": "CVE-2024-13171",
"cwe": {
"id": "CWE-434",
"name": "Unrestricted Upload of File with Dangerous Type"
},
"notes": [
{
"category": "other",
"text": "Unrestricted Upload of File with Dangerous Type",
"title": "CWE-434"
}
],
"product_status": {
"known_affected": [
"CSAFPID-161069"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-13171",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-13171.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-161069"
]
}
],
"title": "CVE-2024-13171"
},
{
"cve": "CVE-2024-13172",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"notes": [
{
"category": "other",
"text": "Improper Verification of Cryptographic Signature",
"title": "CWE-347"
}
],
"product_status": {
"known_affected": [
"CSAFPID-161069"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-13172",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-13172.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-161069"
]
}
],
"title": "CVE-2024-13172"
},
{
"cve": "CVE-2024-32848",
"cwe": {
"id": "CWE-89",
"name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)",
"title": "CWE-89"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1639439",
"CSAFPID-1639440",
"CSAFPID-1638556",
"CSAFPID-1638733",
"CSAFPID-1638734",
"CSAFPID-1638735",
"CSAFPID-161069",
"CSAFPID-161070",
"CSAFPID-161071",
"CSAFPID-161072",
"CSAFPID-161073",
"CSAFPID-793256",
"CSAFPID-1640375"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-32848",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32848.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1639439",
"CSAFPID-1639440",
"CSAFPID-1638556",
"CSAFPID-1638733",
"CSAFPID-1638734",
"CSAFPID-1638735",
"CSAFPID-161069",
"CSAFPID-161070",
"CSAFPID-161071",
"CSAFPID-161072",
"CSAFPID-161073",
"CSAFPID-793256",
"CSAFPID-1640375"
]
}
],
"title": "CVE-2024-32848"
}
]
}
CNVD-2025-18387
Vulnerability from cnvd - Published: 2025-08-13目前厂商已发布升级程序修复该安全问题,详情见厂商官网: https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6
| Name | ['Ivanti Ivanti Endpoint Manager <2024 November Security Update', 'Ivanti Ivanti Endpoint Manager <2022 SU6 November Security Update'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2024-13169",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2024-13169"
}
},
"description": "Ivanti Endpoint Manager\u662fIvanti\u516c\u53f8\u5f00\u53d1\u7684\u4e00\u6b3e\u7efc\u5408\u6027\u7aef\u70b9\u7ba1\u7406\u89e3\u51b3\u65b9\u6848\uff0c\u4e3b\u8981\u7528\u4e8e\u7ba1\u7406\u4f01\u4e1a\u7f51\u7edc\u4e2d\u7684\u6240\u6709\u7aef\u70b9\u8bbe\u5907\u3002\n\nIvanti Endpoint Manager\u5b58\u5728\u8d8a\u754c\u8bfb\u53d6\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u63d0\u5347\u5176\u6743\u9650\u3002",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u7a0b\u5e8f\u4fee\u590d\u8be5\u5b89\u5168\u95ee\u9898\uff0c\u8be6\u60c5\u89c1\u5382\u5546\u5b98\u7f51\uff1a\r\nhttps://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2025-18387",
"openTime": "2025-08-13",
"patchDescription": "Ivanti Endpoint Manager\u662fIvanti\u516c\u53f8\u5f00\u53d1\u7684\u4e00\u6b3e\u7efc\u5408\u6027\u7aef\u70b9\u7ba1\u7406\u89e3\u51b3\u65b9\u6848\uff0c\u4e3b\u8981\u7528\u4e8e\u7ba1\u7406\u4f01\u4e1a\u7f51\u7edc\u4e2d\u7684\u6240\u6709\u7aef\u70b9\u8bbe\u5907\u3002\r\n\r\nIvanti Endpoint Manager\u5b58\u5728\u8d8a\u754c\u8bfb\u53d6\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u63d0\u5347\u5176\u6743\u9650\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Ivanti Endpoint Manager\u8d8a\u754c\u8bfb\u53d6\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Ivanti Ivanti Endpoint Manager \u003c2024 November Security Update",
"Ivanti Ivanti Endpoint Manager \u003c2022 SU6 November Security Update"
]
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2024-13169",
"serverity": "\u4e2d",
"submitTime": "2025-01-23",
"title": "Ivanti Endpoint Manager\u8d8a\u754c\u8bfb\u53d6\u6f0f\u6d1e"
}
GHSA-QM6J-JQGW-8FCG
Vulnerability from github – Published: 2025-01-14 18:32 – Updated: 2025-01-14 18:32An out-of-bounds read in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a local authenticated attacker to escalate their privileges.
{
"affected": [],
"aliases": [
"CVE-2024-13169"
],
"database_specific": {
"cwe_ids": [
"CWE-125"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-01-14T18:15:28Z",
"severity": "HIGH"
},
"details": "An out-of-bounds read in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a local authenticated attacker to escalate their privileges.",
"id": "GHSA-qm6j-jqgw-8fcg",
"modified": "2025-01-14T18:32:02Z",
"published": "2025-01-14T18:32:02Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-13169"
},
{
"type": "WEB",
"url": "https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2024-13169
Vulnerability from fkie_nvd - Published: 2025-01-14 18:15 - Updated: 2025-07-11 17:33| Vendor | Product | Version | |
|---|---|---|---|
| ivanti | endpoint_manager | * | |
| ivanti | endpoint_manager | 2022 | |
| ivanti | endpoint_manager | 2022 | |
| ivanti | endpoint_manager | 2022 | |
| ivanti | endpoint_manager | 2022 | |
| ivanti | endpoint_manager | 2022 | |
| ivanti | endpoint_manager | 2022 | |
| ivanti | endpoint_manager | 2024 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B1F6549B-CF5D-4607-B67D-5489905A1705",
"versionEndExcluding": "2022",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*",
"matchCriteriaId": "46580865-5177-4E55-BDAC-73DA4B472B35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*",
"matchCriteriaId": "E57E12B5-B789-450C-9476-6C4C151E6993",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*",
"matchCriteriaId": "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*",
"matchCriteriaId": "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*",
"matchCriteriaId": "1877FB55-76BA-4714-ABB8-47258132F537",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*",
"matchCriteriaId": "4F9E8D45-5F12-4D45-A74E-C314FA3618A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*",
"matchCriteriaId": "6C7283FE-C10A-4E37-B004-15FB0CAC49A5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds read in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a local authenticated attacker to escalate their privileges."
},
{
"lang": "es",
"value": "Una lectura fuera de los l\u00edmites en Ivanti EPM antes de la actualizaci\u00f3n de seguridad de enero de 2024-2025 y la actualizaci\u00f3n de seguridad de enero de 2022 SU6 permite que un atacante autenticado local escale sus privilegios."
}
],
"id": "CVE-2024-13169",
"lastModified": "2025-07-11T17:33:56.197",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"type": "Secondary"
}
]
},
"published": "2025-01-14T18:15:28.557",
"references": [
{
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"tags": [
"Vendor Advisory"
],
"url": "https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6"
}
],
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
},
{
"lang": "en",
"value": "CWE-843"
}
],
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"type": "Secondary"
}
]
}
WID-SEC-W-2025-0072
Vulnerability from csaf_certbund - Published: 2025-01-14 23:00 - Updated: 2025-03-10 23:00{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Ivanti Endpoint Manager ist eine Endpoint Management Software zur zentralen Verwaltung von Benutzerprofilen und -Ger\u00e4ten.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Ivanti Endpoint Manager ausnutzen, um seine Privilegien zu erweitern, Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen und Informationen offenzulegen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0072 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0072.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0072 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0072"
},
{
"category": "external",
"summary": "Ivanti Security Advisory vom 2025-01-14",
"url": "https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6?language=en_US"
}
],
"source_lang": "en-US",
"title": "Ivanti Endpoint Manager: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-03-10T23:00:00.000+00:00",
"generator": {
"date": "2025-03-11T09:05:19.870+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2025-0072",
"initial_release_date": "2025-01-14T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-01-14T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-02-20T23:00:00.000+00:00",
"number": "2",
"summary": "PoC aufgenommen"
},
{
"date": "2025-03-10T23:00:00.000+00:00",
"number": "3",
"summary": "Aktive Ausnutzung gemeldet"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "2024 \u003cJanuary-2025 Security Update",
"product": {
"name": "Ivanti Endpoint Manager 2024 \u003cJanuary-2025 Security Update",
"product_id": "T040269"
}
},
{
"category": "product_version",
"name": "2024 January-2025 Security Update",
"product": {
"name": "Ivanti Endpoint Manager 2024 January-2025 Security Update",
"product_id": "T040269-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ivanti:endpoint_manager:2024:january-2025_security_update"
}
}
},
{
"category": "product_version_range",
"name": "2022 SU6 \u003cJanuary-2025 Security Update",
"product": {
"name": "Ivanti Endpoint Manager 2022 SU6 \u003cJanuary-2025 Security Update",
"product_id": "T040270"
}
},
{
"category": "product_version",
"name": "2022 SU6 January-2025 Security Update",
"product": {
"name": "Ivanti Endpoint Manager 2022 SU6 January-2025 Security Update",
"product_id": "T040270-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ivanti:endpoint_manager:2022_su6:january-2025_security_update"
}
}
}
],
"category": "product_name",
"name": "Endpoint Manager"
}
],
"category": "vendor",
"name": "Ivanti"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-10811",
"product_status": {
"known_affected": [
"T040270",
"T040269"
]
},
"release_date": "2025-01-14T23:00:00.000+00:00",
"title": "CVE-2024-10811"
},
{
"cve": "CVE-2024-13158",
"product_status": {
"known_affected": [
"T040270",
"T040269"
]
},
"release_date": "2025-01-14T23:00:00.000+00:00",
"title": "CVE-2024-13158"
},
{
"cve": "CVE-2024-13159",
"product_status": {
"known_affected": [
"T040270",
"T040269"
]
},
"release_date": "2025-01-14T23:00:00.000+00:00",
"title": "CVE-2024-13159"
},
{
"cve": "CVE-2024-13160",
"product_status": {
"known_affected": [
"T040270",
"T040269"
]
},
"release_date": "2025-01-14T23:00:00.000+00:00",
"title": "CVE-2024-13160"
},
{
"cve": "CVE-2024-13161",
"product_status": {
"known_affected": [
"T040270",
"T040269"
]
},
"release_date": "2025-01-14T23:00:00.000+00:00",
"title": "CVE-2024-13161"
},
{
"cve": "CVE-2024-13162",
"product_status": {
"known_affected": [
"T040270",
"T040269"
]
},
"release_date": "2025-01-14T23:00:00.000+00:00",
"title": "CVE-2024-13162"
},
{
"cve": "CVE-2024-13163",
"product_status": {
"known_affected": [
"T040270",
"T040269"
]
},
"release_date": "2025-01-14T23:00:00.000+00:00",
"title": "CVE-2024-13163"
},
{
"cve": "CVE-2024-13164",
"product_status": {
"known_affected": [
"T040270",
"T040269"
]
},
"release_date": "2025-01-14T23:00:00.000+00:00",
"title": "CVE-2024-13164"
},
{
"cve": "CVE-2024-13165",
"product_status": {
"known_affected": [
"T040270",
"T040269"
]
},
"release_date": "2025-01-14T23:00:00.000+00:00",
"title": "CVE-2024-13165"
},
{
"cve": "CVE-2024-13166",
"product_status": {
"known_affected": [
"T040270",
"T040269"
]
},
"release_date": "2025-01-14T23:00:00.000+00:00",
"title": "CVE-2024-13166"
},
{
"cve": "CVE-2024-13167",
"product_status": {
"known_affected": [
"T040270",
"T040269"
]
},
"release_date": "2025-01-14T23:00:00.000+00:00",
"title": "CVE-2024-13167"
},
{
"cve": "CVE-2024-13168",
"product_status": {
"known_affected": [
"T040270",
"T040269"
]
},
"release_date": "2025-01-14T23:00:00.000+00:00",
"title": "CVE-2024-13168"
},
{
"cve": "CVE-2024-13169",
"product_status": {
"known_affected": [
"T040270",
"T040269"
]
},
"release_date": "2025-01-14T23:00:00.000+00:00",
"title": "CVE-2024-13169"
},
{
"cve": "CVE-2024-13170",
"product_status": {
"known_affected": [
"T040270",
"T040269"
]
},
"release_date": "2025-01-14T23:00:00.000+00:00",
"title": "CVE-2024-13170"
},
{
"cve": "CVE-2024-13171",
"product_status": {
"known_affected": [
"T040270",
"T040269"
]
},
"release_date": "2025-01-14T23:00:00.000+00:00",
"title": "CVE-2024-13171"
},
{
"cve": "CVE-2024-13172",
"product_status": {
"known_affected": [
"T040270",
"T040269"
]
},
"release_date": "2025-01-14T23:00:00.000+00:00",
"title": "CVE-2024-13172"
},
{
"cve": "CVE-2024-32848",
"product_status": {
"known_affected": [
"T040270",
"T040269"
]
},
"release_date": "2025-01-14T23:00:00.000+00:00",
"title": "CVE-2024-32848"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.