CVE-2024-13161 Scanner

Ivanti EPM - Credential Coercion Vulnerability in GetHashForSingleFile CVE-2024-13161 Scanner

Short Info


Level

Critical

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

11 days 6 hours

Scan only one

Domain, Subdomain, IPv4

Toolbox

-

Ivanti Endpoint Manager (EPM) is a comprehensive endpoint management solution widely used by organizations to manage and secure their IT infrastructure. It provides capabilities such as software distribution, patch management, and security configuration. This product is essential for managing corporate endpoints, ensuring that they remain secure, compliant, and well-maintained across an organization's network. However, like many networked systems, Ivanti EPM is susceptible to vulnerabilities that can compromise its effectiveness and expose critical assets to attackers. The vulnerability in question is found within a specific endpoint of Ivanti EPM and can be exploited remotely by unauthenticated attackers. The affected version and more specific version details are not provided, but the vulnerability itself can severely impact the security of the system.

The vulnerability identified in Ivanti Endpoint Manager involves improper input validation within the GetHashForSingleFile endpoint. This flaw allows an unauthenticated attacker to coerce the EPM machine account credentials via the use of a remote UNC path. When an attacker specifies a crafted wildcard parameter, the EPM system triggers NTLM authentication, which could potentially expose sensitive credentials. This type of vulnerability is categorized as a credential coercion issue and has a critical CVSS score of 9.8. Exploitation of this vulnerability could lead to unauthorized access or disclosure of credentials, which could facilitate further attacks on the system.

The vulnerability resides in the GetHashForSingleFile function of Ivanti EPM, where the wildcard parameter is improperly validated. This improper validation allows an attacker to inject a malicious UNC path in the wildcard parameter, triggering NTLM authentication. The attacker can then coerce the system to authenticate to an attacker-controlled server, leaking sensitive credentials such as machine account credentials. The attack does not require any authentication, making it a severe remote unauthenticated attack vector. The vulnerable parameter is the wildcard used in the SOAP request body, and the exploitation of this vulnerability is contingent on the system’s failure to properly validate this input.

If successfully exploited, this vulnerability allows an attacker to coerce sensitive machine account credentials through NTLM authentication. These credentials may be used in further attacks, such as lateral movement within the network, privilege escalation, or data exfiltration. The attacker can potentially access restricted systems or compromise the overall security of the network. Exploiting this vulnerability could also result in a full compromise of the targeted endpoint, making it a high-impact attack. Organizations relying on Ivanti Endpoint Manager for endpoint security and management could face significant risks if this vulnerability is not mitigated.

REFERENCES

Get started to protecting your Free Full Security Scan