Get a free application, infrastructure and malware scan report - Scan Your Website Now

Credential Coercion Vulnerabilities in Ivanti Endpoint Manager

Posted DateMarch 7, 2025
Posted Time 2   min Read

Multiple vulnerabilities have been discovered in Ivanti Endpoint Manager, affecting various file hashing functions. These vulnerabilities—CVE-2024-10811, CVE-2024-13161, CVE-2024-13160, and CVE-2024-13159—allow credential coercion, which can lead to path traversal and potentially enable remote code execution (RCE).  

Breakdown of the Vulnerabilities 

CVE-2024-10811 – Credential Coercion in GetHashForFile 

The GetHashForFile() function can be exploited to coerce Ivanti Endpoint Manager into authenticating against a malicious server. Since it passes user-controlled input to GetHashForSingleFile(), attackers can abuse this function for NTLM relay attacks, potentially leading to credential theft and unauthorized network access.  

CVE-2024-13161: Credential Coercion in GetHashForSingleFilex 

A similar vulnerability exists in GetHashForSingleFile, which also enables attackers to trigger an NTLM authentication request when a file is processed for hashing. This behavior can be exploited to capture authentication credentials, potentially leading to domain compromise. This vulnerability can also be leveraged for arbitrary file access, facilitating data exfiltration or further privilege escalation. 

CVE-2024-13160: Credential Coercion in GetHashForWildcard 

With GetHashForWildcard, an attacker can manipulate file paths or wildcard-based file path functions to coerce NTLM authentication requests. The risk increases if wildcard processing includes remote file paths controlled by an attacker. 

CVE-2024-13159 – Credential Coercion in GetHashForWildcardRecursive  

A more severe variation of the previous vulnerability, GetHashForWildcardRecursive extends the attack surface by recursively processing files in directories. Attackers can manipulate path traversal flaws to access system-critical files and execute arbitrary commands, leading to RCE. This makes it a high-impact vulnerability requiring immediate patching. 

Potential Exploitation and Risks 

An attacker with network access can exploit these vulnerabilities by hosting a malicious SMB or HTTP server. When Ivanti Endpoint Manager processes a file using the affected hashing functions, it unknowingly attempts to authenticate against the attacker’s server, exposing NTLM authentication credentials. These credentials can then be relayed to other systems within the network, bypassing authentication mechanisms and gaining unauthorized access. 

If successfully exploited, attackers could: 

  • Gain unauthorized access to sensitive internal resources 
  • Escalate privileges within the domain 
  • Compromise user accounts and perform lateral movement 
  • Deploy malware or ransomware in targeted environments 

Mitigation and Recommended Actions  

To protect against these vulnerabilities, organizations using Ivanti Endpoint Manager should: 

  • Apply Security Patches: Ivanti has released patches addressing these vulnerabilities. Immediate updates are strongly recommended. 
  • Enforce SMB Signing and NTLM Protections: Disable NTLM where possible or enforce SMB signing to prevent relay attacks. 
  • Monitor NTLM Authentication Requests: Implement logging and monitoring to detect unusual NTLM authentication attempts. 
  • Use Stronger Authentication Mechanisms: Enforce Kerberos authentication instead of NTLM where feasible. 
  • Restrict Outbound NTLM Traffic: Use Group Policy or security controls to prevent NTLM authentication requests from being sent outside the network. 

AppTrana WAAP Coverage   

With AppTrana WAAP’s out-of-the-box coverage, our customers have been protected against this CVEs from the day 0. 

During PoC simulations, AppTrana WAAP effectively blocked the malicious request, as illustrated in the screenshot: 

AppTrana Coverage - Credential Coercion Vulnerabilities in Ivanti Endpoint Manager

 Stay tuned for more relevant and interesting security articles. Follow Indusface on FacebookTwitter, and LinkedIn.

AppTrana WAAP

 

Pavan Bhushan Reddy
Pavan Bushan Reddy

Pavan Bushan Reddy is an Security Researcher at Indusface. He is deeply involved in fortifying web application security through the development and optimization of Indusface WAF Rules ensuring robust protection against potential threats, complemented by in-depth vulnerability research and comprehensive Zero-day Coverage. He has done PG Diploma in IT Infrastructure, Systems and security at CDAC. Pavan is very much Passionate in cyber defense and Pentesting also he is a CTF player in HackTheBox.

Share Article:

Join 51000+ Security Leaders

Get weekly tips on blocking ransomware, DDoS and bot attacks and Zero-day threats.

We're committed to your privacy. indusface uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.

Related Posts

How AppTrana WAAP Helps Achieve FedRAMP Compliance
How AppTrana WAAP Helps Achieve FedRAMP Compliance

Explore how AppTrana WAAP helps achieve FedRAMP compliance with automated risk assessment, system integrity controls, continuous monitoring & threat mitigation

Read More
AppTrana WAAP Dashboard
Unveiling the All-New AppTrana WAAP Dashboard

Discover our new WAAP dashboard: monitor, analyze, and enhance security in real time with visibility and insights to secure assets and prioritize remediation.

Read More
Best WAAP Software in 2023
17 Best Cloud WAAP & WAF Software in 2025

Examine the best 17 Cloud WAF and WAAP Solutions for 2023, including a detailed analysis of their key features, pros, cons, reviews, and ratings.

Read More

AppTrana

Fully Managed SaaS-Based Web Application Security Solution

Get free access to Integrated Application Scanner, Web Application Firewall, DDoS & Bot Mitigation, and CDN for 14 days

Get Started for Free Request a Demo

Gartner

Indusface is the only cloud WAAP (WAF) vendor with 100% customer recommendation for 4 consecutive years.

A Customers’ Choice for 2024, 2023 and 2022 - Gartner® Peer Insights™

The reviews and ratings are in!