Skip to content

Conversation

@buixor
Copy link
Contributor

@buixor buixor commented Mar 13, 2025

The detection rule for CVE-2024-13161 targets the Ivanti EPM vulnerability where an attacker can coerce NTLM credentials. The rule checks for:

  1. The specific endpoint /WSVulnerabilityCore/VulCore.asmx in the URI.
  2. The presence of a UNC path in the wildcard XML tag within the SOAP body, which is indicative of the attack.
  3. The Soapaction header must exactly match the expected action for the vulnerable function.

The rule uses case-insensitive matching (lowercase transformation) to ensure robust detection against variations in case. The regex used for the wildcard tag is designed to detect typical UNC path exploitation patterns. This rule is designed to have high confidence with minimal false positives by specifically targeting the elements involved in the exploit.

@github-actions
Copy link

Hello @buixor,

✅ The new VPATCH Rule is compliant, thank you for your contribution!

@github-actions
Copy link

Hello @buixor,

Scenarios/AppSec Rule are compliant with the taxonomy, thank you for your contribution!

@buixor buixor closed this Mar 13, 2025
@buixor buixor deleted the 1741883134-CVE-2024-13161 branch March 13, 2025 17:18
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants