The two flaws, discovered in open-source libraries integrated into Ivanti’s on-premises EPMM product, present a dangerous attack chain when combined:
When chained together, these vulnerabilities enable pre-authenticated remote code execution, allowing attackers to gain control over affected systems without prior access.
Ivanti has confirmed that attackers have exploited these vulnerabilities in a “very limited” number of customer environments, leveraging the flaws as zero-days before public disclosure.
The company, alongside CERT-EU-the cybersecurity service for European Union institutions flagged the vulnerabilities as particularly severe, especially for organizations managing sensitive or regulated data.
The vulnerabilities are exclusive to the on-premises version of Ivanti EPMM, a widely used mobile device management (MDM) and endpoint security solution for enterprises.
Cloud-hosted versions are not affected.
Security researchers, including those at watchTowr, have released detection tools capable of identifying vulnerable systems.
A screenshot of such a tool, “watchTowr-vs-Ivanti-EPMM-rce-chain.py,” demonstrates successful exploitation of the vulnerability chain, confirming a target system as “VULNERABLE” after executing a test command.
This underscores the ease with which attackers can automate exploitation if systems remain unpatched.
Ivanti has released patched versions 11.12.0.5, 12.3.0.2, 12.4.0.2, and 12.5.0.1-and is collaborating with security partners and law enforcement to contain the threat.
Customers unable to immediately upgrade are advised to apply workarounds, such as restricting API access through Portal ACLs or external web application firewalls (WAFs).
CERT-EU and other security bodies strongly recommend prompt patching, especially for Internet-facing EPMM deployments, to prevent further exploitation.
Ivanti’s investigation is ongoing, and the company has not yet released detailed indicators of compromise. Customers are encouraged to contact Ivanti Support for the latest guidance and to monitor official advisories for updates.
The discovery and exploitation of CVE-2025-4427 and CVE-2025-4428 in Ivanti EPMM underscore the critical importance of timely patch management and vigilant security monitoring for enterprise infrastructure.
With proof-of-concept exploits circulating and active attacks reported, swift action is essential to safeguard sensitive data and maintain operational integrity.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates
The post Multiple Ivanti Endpoint Manager Vulnerabilities Enable Remote Code Execution appeared first on Cyber Security News.
Prices at the pump have been climbing, jumping more than $1 a gallon since the…
BIG COUNTRY, Texas (KTAB/KRBC) - In this episode of Carter and Kat’s Weather Chat, our…
ABC has pulled the newest season of "The Bachelorette" amid controversy with its main contestant,…
ABILENE, Texas (KTAB/KRBC) - A mom from Buffalo Gap shared about life as an empty…
Editor’s Note: The Abilene Police Department supplied the following arrest and incident reports. All information…
TAYLOR COUNTY, Texas (KTAB/KRBC) - Dozens of dogs have been rescued from a property in…
This website uses cookies.