Ivanti has disclosed two critical code injection vulnerabilities in its Endpoint Manager Mobile (EPMM) product that enable unauthenticated remote code execution and have been exploited in zero-day attacks.
Summary : Security Advisory: Ivanti has publicly disclosed 13 vulnerabilities affecting its Endpoint Manager (EPM) 2024 and earlier releases. It includes 2 high-severity issues, 1 enabling remote code execution (RCE) and the other supporting privilege escalation alongside 11 medium-severity SQL injection flaws.Successful exploitation could lead to privilege escalation or remote code execution.
OEM
Ivanti
Severity
High
CVSS Score
8.8
CVEs
CVE-2025-11622, CVE-2025-9713 & CVEs for SQL
POC Available
No
Actively Exploited
No
Exploited in Wild
No
Advisory Version
1.0
Overview
These vulnerabilities are considered critical for enterprise environments, as they could permit attackers to gain unauthorized access, execute arbitrary code, or extract sensitive database information from vulnerable endpoints.
Administrators are urged to update to the latest version to mitigate the attack and prevent potential exploitation.
Vulnerability Name
CVE ID
Product Affected
Severity
Fixed Version
Insecure Deserialization
CVE-2025-11622
Ivanti Endpoint Manager 2024 SU3 SR1 and prior
High
2024 SU4
Path Traversal – Remote Code Execution
CVE-2025-9713
Ivanti Endpoint Manager 2024 SU3 SR1 and prior
High
Technical Summary
2 severe vulnerabilities in Ivanti Endpoint Manager significantly increase the risk to affected systems. One of the issues involves insecure deserialization, which may allow a local authenticated attacker to elevate their privileges and gain unauthorized access to sensitive functions or data.
Another notable vulnerability is a path traversal flaw that can lead to remote code execution when triggered by a remote unauthenticated attacker, provided certain user interaction occurs. In addition to these, multiple instances of SQL injection have been identified across various components of the application. These flaws could be exploited by remote authenticated users to retrieve unauthorized information from the backend database, potentially exposing sensitive data.
These vulnerabilities underscores the importance of implementing secure coding practices, validating user input, and applying timely security patches to minimize risk and protect system assets.
CVE ID
Component Affected
Vulnerability Details
Impact
CVE-2025-11622
Ivanti Endpoint Manager
This flaw allows a local authenticated attacker to escalate privileges on the EPM Core server by exploiting deserialization routines.
Privilege Escalation / Remote Code Execution
CVE-2025-9713
Ivanti Endpoint Manager
This enables remote unauthenticated attackers to achieve remote code execution, with user interaction required to trigger malicious file import or configuration actions.
Remote Code Execution / System Compromise
In addition, releasing eleven CVEs for SQL injection vulnerabilities that permit remote authenticated attackers to access and read arbitrary data from the database.
Update Ivanti Endpoint Manager to the following versions when available:
2024 SU4 for high-severity vulnerabilities (targeted release November 12, 2025)
2024 SU5 for SQL injection vulnerabilities (scheduled Q1 2026)
Patches are currently under development, here are some mitigations below to protect the environment
Use Ivanti EPM 2024 SU3 SR1 to reduce the risk associated with the insecure deserialization vulnerability.
Limit access to the EPM Core server to local administrators only.
Use a firewall with a strict whitelisting configuration to block remote access.
Avoid importing untrusted configuration files into the EPM Core server.
Remove the reporting database user from the EPM configuration to mitigate the SQL injection vulnerabilities. But this action will disable reporting functionality, as the reporting database user is required to run reports.
Conclusion: These vulnerabilities pose a significant threat to organizations relying on Ivanti Endpoint Manager for enterprise device management, potentially enabling privilege escalation, remote code execution, and unauthorized data access. Enterprises are strongly urged to implement Ivanti’s recommended mitigations without delay to reduce immediate risk. Additionally, organizations should prepare for the timely deployment of the upcoming security updates as they become available. Proactive action is essential to maintaining the security and integrity of endpoint management infrastructure.
Ivanti announced two critical vulnerabilities impacting its Connect Secure (ICS) VPN appliances: CVE-2025-0282 and CVE-2025-0283. Notably, CVE-2025-0282 has been actively exploited in the wild since mid-December 2024.
As per Ivanti threat actors have attempted to bypass detection by the ICT, Ivanti has provided examples demonstrating the differences between successful scans and unsuccessful ones on compromised devices to help users identify potential compromises.
Summary
OEM
Ivanti
Severity
Critical
CVSS
9.0
CVEs
CVE-2025-0282, CVE-2025-0283
Exploited in Wild
Yes
Patch/Remediation Available
Yes
Advisory Version
1.0
Overview
This stack-based buffer overflow flaw allows unauthenticated attackers to execute arbitrary code on affected devices. Another Vulnerability, CVE-2025-0283, could allow a local authenticated attacker to escalate privileges. Ivanti has released patches for Connect Secure and recommends immediate updates to mitigate the risk.
Vulnerability Name
CVE ID
Product Affected
Severity
Affected Version
Stack-Based Buffer Overflow Vulnerability
CVE-2025-0282
Ivanti
Critical
22.7R2 through 22.7R2.4 22.7R1 through 22.7R1.2 22.7R2 through 22.7R2.3
Stack-Based Buffer Overflow Vulnerability
CVE-2025-0283
Ivanti
High
22.7R2.4 and prior 9.1R18.9 and prior 22.7R1.2 and prior 22.7R2.3 and prior
A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a remote unauthenticated attacker to achieve remote code execution.
RCE, System compromise, Data theft, Network breaches, and Service disruptions.
A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a local authenticated attacker to escalate their privileges
Allow Local Authenticated Attackers to Escalate Privileges.
Remediation:
Ensure that the appropriate patches or updates are applied to the relevant Ivanti
Organizations using ICS appliances are strongly advised to apply these patches and follow Ivanti’s Security Advisory to safeguard their systems.
versions as listed below:
Affected Version(s)
Fixes and Releases
22.7R2 through 22.7R2.4
22.7R2.5
22.7R2.4 and prior, 9.1R18.9 and prior
22.7R2.5
22.7R2 through 22.7R2.3
22.7R2.5, Patch planned availability Jan. 21
22.7R2.3 and prior
22.7R2.5, Patch planned availability Jan. 21
22.7R1 through 22.7R1.2
Patch planned availability Jan. 21
22.7R1.2 and prior
Patch planned availability Jan. 21
Ivanti Connect Secure: Upgrade to version 22.7R2.5, perform a clean ICT scan, and factory reset appliances before putting them into production for added security.
Ivanti Connect Secure (Compromise Detected): Perform a factory reset and upgrade to version 22.7R2.5 to remove malware and ensure continued monitoring with security tools.
Ivanti Policy Secure: Ensure the appliance is not exposed to the internet, as the risk of exploitation is lower, and expect a fix on January 21, 2025.
Ivanti Neurons for ZTA Gateways: Ensure ZTA gateways are connected to a controller for protection, with a fix available on January 21, 2025.
General Recommendation
Regularly update software and systems to address known vulnerabilities.
Implement continuous monitoring to identify any unauthorized access or suspicious activities.
Use strong authentication and access controls to minimize unauthorized access and reduce attack surfaces.
Create and Maintain an incident response plan to quickly mitigate the impact of any security breach.
Recent Comments