Summary : Security Advisory: Ivanti has publicly disclosed 13 vulnerabilities affecting its Endpoint Manager (EPM) 2024 and earlier releases. It includes 2 high-severity issues, 1 enabling remote code execution (RCE) and the other supporting privilege escalation alongside 11 medium-severity SQL injection flaws. Successful exploitation could lead to privilege escalation or remote code execution.
| OEM | Ivanti |
| Severity | High |
| CVSS Score | 8.8 |
| CVEs | CVE-2025-11622, CVE-2025-9713 & CVEs for SQL |
| POC Available | No |
| Actively Exploited | No |
| Exploited in Wild | No |
| Advisory Version | 1.0 |
Overview
These vulnerabilities are considered critical for enterprise environments, as they could permit attackers to gain unauthorized access, execute arbitrary code, or extract sensitive database information from vulnerable endpoints.
Administrators are urged to update to the latest version to mitigate the attack and prevent potential exploitation.
| Vulnerability Name | CVE ID | Product Affected | Severity | Fixed Version |
| Insecure Deserialization | CVE-2025-11622 | Ivanti Endpoint Manager 2024 SU3 SR1 and prior | High | 2024 SU4 |
| Path Traversal – Remote Code Execution | CVE-2025-9713 | Ivanti Endpoint Manager 2024 SU3 SR1 and prior | High |
Technical Summary
2 severe vulnerabilities in Ivanti Endpoint Manager significantly increase the risk to affected systems. One of the issues involves insecure deserialization, which may allow a local authenticated attacker to elevate their privileges and gain unauthorized access to sensitive functions or data.
Another notable vulnerability is a path traversal flaw that can lead to remote code execution when triggered by a remote unauthenticated attacker, provided certain user interaction occurs. In addition to these, multiple instances of SQL injection have been identified across various components of the application. These flaws could be exploited by remote authenticated users to retrieve unauthorized information from the backend database, potentially exposing sensitive data.
These vulnerabilities underscores the importance of implementing secure coding practices, validating user input, and applying timely security patches to minimize risk and protect system assets.
| CVE ID | Component Affected | Vulnerability Details | Impact |
| CVE-2025-11622 | Ivanti Endpoint Manager | This flaw allows a local authenticated attacker to escalate privileges on the EPM Core server by exploiting deserialization routines. | Privilege Escalation / Remote Code Execution |
| CVE-2025-9713 | Ivanti Endpoint Manager | This enables remote unauthenticated attackers to achieve remote code execution, with user interaction required to trigger malicious file import or configuration actions. | Remote Code Execution / System Compromise |
In addition, releasing eleven CVEs for SQL injection vulnerabilities that permit remote authenticated attackers to access and read arbitrary data from the database.
| Vulnerability Name | CVE ID | Affected Component | Severity |
| SQL Injection Flaws | CVE-2025-1162 CVE-2025-62383 CVE-2025-62384 CVE-2025-62385 CVE-2025-62386 CVE-2025-62387 CVE-2025-62388 CVE-2025-62389 CVE-2025-62390 CVE-2025-62391 CVE-2025-62392 | Ivanti Endpoint Manager | Medium |
Recommendations
Update Ivanti Endpoint Manager to the following versions when available:
Patches are currently under development, here are some mitigations below to protect the environment
Conclusion:
These vulnerabilities pose a significant threat to organizations relying on Ivanti Endpoint Manager for enterprise device management, potentially enabling privilege escalation, remote code execution, and unauthorized data access. Enterprises are strongly urged to implement Ivanti’s recommended mitigations without delay to reduce immediate risk. Additionally, organizations should prepare for the timely deployment of the upcoming security updates as they become available. Proactive action is essential to maintaining the security and integrity of endpoint management infrastructure.
References: