CVE-2025-13659
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-11
Assigner: ivanti
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ivanti | endpoint_manager | * |
| ivanti | endpoint_manager | 2024 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-913 | The product does not properly restrict reading from or writing to dynamically-managed code resources such as variables, objects, classes, attributes, functions, or executable instructions or statements. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Ivanti Endpoint Manager prior to version 2024 SU4 SR1 involves improper control of dynamically managed code resources. It allows a remote, unauthenticated attacker to write arbitrary files on the server, which could potentially lead to remote code execution. User interaction is required for exploitation.
How can this vulnerability impact me? :
The vulnerability can allow an attacker to write arbitrary files on the server remotely without authentication, potentially leading to remote code execution. This means an attacker could take control of the affected system, compromise data integrity, availability, and confidentiality.