This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Ivanti EPM has a critical **Absolute Path Traversal** flaw. <br>π₯ **Consequences**: Remote attackers can **leak sensitive info** and coerce machine credentials for relay attacks.β¦
β‘ **Threshold**: **LOW**. <br>π **Auth**: **None required** (Unauthenticated). <br>π **Access**: Remote (Network). <br>π€ **UI**: No user interaction needed.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π₯ **Public Exp?**: **YES**. <br>π **PoC**: Available on GitHub (e.g., `horizon3ai/Ivanti-EPM-Coercion-Vulnerabilities`). <br>π οΈ **Tools**: Nuclei templates exist for automated scanning.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: <br>1. Scan for **Ivanti EPM** endpoints. <br>2. Use **Nuclei** with CVE-2024-13159 template. <br>3. Look for **UNC path** injection points in `GetHashForWildcardRecursive`.