What is Ivanti Endpoint Manager (EPM)?
Ivanti Endpoint Manager (EPM) is an enterprise IT asset management and endpoint control platform used by organizations to centrally discover, inventory, deploy software to, and manage the lifecycle of Windows, macOS, Linux, and mobile devices across their network. It is distinct from Ivanti EPMM (Endpoint Manager Mobile) — EPM focuses on traditional endpoints rather than mobile fleet management.
Key functions include:
- Asset discovery and inventory — automatically discover and catalog all devices on the network, including hardware specifications, installed software, and patch status
- Software distribution — centrally deploy, update, and remove applications across thousands of endpoints simultaneously
- Patch management — identify missing patches and orchestrate patch deployment across the managed device fleet
- OS deployment — provision bare-metal and virtual machines with operating system images at scale
- Remote control and troubleshooting — allow IT administrators to remotely connect to and manage endpoints
- Credential management — store and use privileged credentials (domain admin accounts, service accounts) required to authenticate to and manage remote endpoints
Because EPM must authenticate to every managed endpoint, it necessarily holds a credential vault containing high-privilege accounts. The EPM Core server also performs hash calculation operations against files on managed endpoints — these file hash operations are the attack surface exploited by CVE-2024-13159, CVE-2024-13160, and CVE-2024-13161.
Overview
CVE-2024-13160 is one of three closely related absolute path traversal vulnerabilities (disclosed alongside CVE-2024-13159 and CVE-2024-13161) in Ivanti Endpoint Manager that allow a remote unauthenticated attacker to coerce the EPM server into authenticating to an attacker-controlled SMB server. This credential coercion attack captures the EPM machine account's NTLMv2 hash, which can then be relayed to a domain controller to create privileged accounts or otherwise escalate within the Active Directory environment.
All three CVEs were disclosed together in Ivanti's January 2025 security advisory, discovered by Horizon3.ai, and added to the CISA KEV catalog on March 10, 2025 after exploitation in the wild was confirmed.
CVE-2024-13160 specifically involves the GetHashForWildcard function. See also CVE-2024-13159 (GetHashForWildcardRecursive) and CVE-2024-13161 (GetHashForSingleFile).
Affected Versions
| Version | Status |
|---|---|
| EPM 2024 (before January-2025 Security Update) | Vulnerable |
| EPM 2024 January-2025 Security Update | Fixed |
| EPM 2022 SU6 (before January-2025 Security Update) | Vulnerable |
| EPM 2022 SU6 January-2025 Security Update | Fixed |
| EPM 2022 SU5 and prior | Vulnerable |
Fix: Apply the Ivanti EPM January 2025 Security Update for EPM 2024 or EPM 2022 SU6.
Technical Details
CVE-2024-13160 is a CWE-36 (Absolute Path Traversal) vulnerability residing in WSVulnerabilityCore.dll, located at C:\Program Files\LANDesk\ManagementSuite\WSVulnerabilityCore.dll on the EPM Core server.
Vulnerable function: GetHashForWildcard
The EPM server exposes web service endpoints that perform file hash calculations across files matching a wildcard pattern. The GetHashForWildcard method accepts a path parameter and, like its recursive counterpart in CVE-2024-13159, passes it to the hash calculator without validating whether the supplied path resolves outside of an expected restricted directory. The method permits unauthenticated users to construct paths that resolve to remote UNC locations on attacker-controlled servers.
Attack chain:
- An unauthenticated remote attacker sends a crafted request to the EPM web service, supplying a UNC path (e.g.,
\\attacker-ip\share\*) as thewildcardparameter to theGetHashForWildcardendpoint. - The EPM server, without validating the path, attempts to access the attacker-controlled SMB server to enumerate matching files.
- During the SMB connection attempt, the EPM machine account transmits its NTLMv2 credentials to the attacker's server.
- The attacker captures the NTLMv2 hash using a tool such as Responder, then relays it to a domain controller via LDAP using
ntlmrelayx. - The relayed authentication is used to create a privileged machine account in Active Directory with delegation rights, enabling further privilege escalation or domain takeover.
Attack characteristics:
- No credentials required — fully unauthenticated
- Exploitable remotely over the network (CVSS Attack Vector: Network)
- No user interaction required
- A single crafted request triggers the credential coercion
- The captured NTLMv2 hash can be relayed in real time or cracked offline
- The difference between CVE-2024-13160 and CVE-2024-13159 is the specific API method targeted; both exploit the same underlying class of path validation failure in WSVulnerabilityCore.dll
CWE-36 (Absolute Path Traversal): The product uses external input to construct a pathname but does not properly neutralize absolute path sequences that can resolve outside the intended restricted directory — in this case, allowing the path to resolve to a remote UNC location on an attacker-controlled server.
Discovery
All four credential coercion vulnerabilities in this group (CVE-2024-10811, CVE-2024-13159, CVE-2024-13160, and CVE-2024-13161) were discovered by Horizon3.ai. They coordinated disclosure with Ivanti, agreeing to a 30-day embargo after the January 13, 2025 patch release before publishing technical details. Horizon3.ai published their full analysis and proof-of-concept exploit on February 19, 2025.
Exploitation Context
CISA added CVE-2024-13159, CVE-2024-13160, and CVE-2024-13161 to the KEV catalog on March 10, 2025 — approximately two months after Ivanti's patch release and three weeks after Horizon3.ai's PoC publication. The relatively rapid move to the KEV catalog after PoC publication is consistent with attackers weaponizing the published exploit.
Exploitation of these vulnerabilities does not require compromising the EPM server directly — rather, it forces the EPM server to become an unwitting participant in a credential relay attack. When the relayed machine account credentials are used to create privileged Active Directory accounts, the downstream impact can extend to full domain compromise.
The three CVEs are often exploited as a set, since each covers a different web service endpoint performing the same underlying hash calculation operation. Attempting all three increases an attacker's chances of triggering a successful credential coercion, as organizations may have only partially blocked individual endpoints.
At the time of CISA's KEV addition, no specific threat actors or ransomware groups had been publicly attributed to active exploitation of these vulnerabilities.
Remediation
- Apply the January 2025 Security Update for your EPM version — EPM 2024 January-2025 SU or EPM 2022 SU6 January-2025 SU; this is the primary fix
- Block outbound SMB traffic from the EPM Core server — prevent the EPM server from initiating outbound connections on TCP port 445 to hosts outside of known managed endpoints; this breaks the UNC path coercion attack at the network level even on unpatched systems
- Enable SMB signing on the EPM server — SMB signing prevents captured NTLMv2 credentials from being relayed; enable it via Group Policy (
Microsoft network client: Digitally sign communications (always)) as a layered defense - Restrict network access to EPM web services — limit access to the EPM Core server web service endpoints to authorized management hosts and subnets only
- Review Active Directory for unauthorized machine accounts — look for recently created machine accounts with unusual delegation attributes, particularly any created around the time PoC was published (February 2025 onward)
- Audit domain controller authentication logs — look for NTLM authentication events originating from the EPM server's IP address against the domain controller, particularly during periods when exploitation may have occurred
- Rotate EPM machine account credentials — if exploitation is suspected, reset the EPM server's machine account password in Active Directory (
Reset-ComputerMachinePasswordor domain controller tooling) - Discontinue use if patching is not achievable — an unpatched EPM server reachable from untrusted networks can be used to coerce and relay machine account credentials, enabling domain-level attacks
Key Details
| Property | Value |
|---|---|
| CVE ID | CVE-2024-13160 |
| Vendor / Product | Ivanti — Endpoint Manager (EPM) |
| NVD Published | 2025-01-14 |
| NVD Last Modified | 2025-10-24 |
| CVSS 3.1 Score | 9.8 |
| CVSS 3.1 Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| Severity | CRITICAL |
| CWE | CWE-36 |
| CISA KEV Added | 2025-03-10 |
| CISA KEV Deadline | 2025-03-31 |
| Known Ransomware Use | No |
CVSS 3.1 Breakdown
Required Action
Timeline
| Date | Event |
|---|---|
| 2025-01-13 | Ivanti publishes Security Advisory EPM January 2025 and releases patches for EPM 2024 and EPM 2022 SU6; CVE-2024-13159, CVE-2024-13160, CVE-2024-13161, and CVE-2024-10811 disclosed together |
| 2025-01-14 | CVE-2024-13160 published to NVD |
| 2025-02-19 | Horizon3.ai publishes detailed technical analysis of all four credential coercion vulnerabilities and releases proof-of-concept exploit (30-day coordinated disclosure window after January patch) |
| 2025-03-10 | CISA adds CVE-2024-13159, CVE-2024-13160, and CVE-2024-13161 to Known Exploited Vulnerabilities catalog, confirming active exploitation in the wild |
| 2025-03-31 | CISA BOD 22-01 remediation deadline for federal civilian executive branch agencies |