At the time of disclosure, there are no reports of active exploitation in customer environments.
Two distinct CVE entries, CVE-2025-9712 and CVE-2025-9872, both stem from insufficient filename validation in Ivanti Endpoint Manager before the release of Security Update 1 for the 2024 SU3 branch and Security Update 2 for the 2022 SU8 branch.
An unauthenticated attacker can craft malicious filenames to trigger remote code execution when a user interacts with a specially crafted link or file.
Both vulnerabilities carry a CVSS 3.0 score of 8.8, reflecting their high impact on confidentiality, integrity, and availability.
The root cause in each case is improper sanitization of user-supplied filenames before processing by the Endpoint Manager service.
When a targeted user is tricked into opening or interacting with a manipulated EPM interface—such as via a phishing email or malicious website—the flawed validation allows arbitrary code injection and execution in the context of the EPM service.
| CVE Number | CVSS Score (Severity) | CVSS Vector | CWE |
|---|---|---|---|
| CVE-2025-9712 | 8.8 (High) | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | CWE-434 |
| CVE-2025-9872 | 8.8 (High) | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | CWE-434 |
Both vulnerabilities affect:
Ivanti has published Security Update 2 for the 2022 SU8 branch and Security Update 1 for the 2024 SU3 branch.
Customers must install the appropriate update to fully remediate the risk.
Patches are available through the Ivanti License System (ILS) portal and require a user login.
Administrators should verify deployment across all managed servers and endpoints to ensure no legacy versions remain in operation.
It is also critical to note that the 2022 branch will reach End of Life at the end of October 2025, after which it will no longer receive security fixes.
Organizations still running 2022 SU8 should plan an upgrade to the 2024 branch or a supported alternative to maintain security compliance.
Ivanti strongly advises all customers to:
By proactively installing these updates and retiring unsupported branches, organizations can substantially reduce the risk of remote code execution attacks against their Endpoint Manager infrastructure.
Find this Story Interesting! Follow us on Google News, LinkedIn and X to Get More Instant Updates
The post Ivanti Endpoint Manager Vulnerabilities Allow Remote Code Execution Attacks appeared first on Cyber Security News.
Christopher Nolan has confirmed a casting twist for his upcoming “mythic action epic,” The Odyssey.…
Christopher Nolan has confirmed a casting twist for his upcoming “mythic action epic,” The Odyssey.…
For this week only, Best Buy is offering a rare deal on a compact convertible…
Microsoft’s May 2026 Patch Tuesday lands with a heavy enterprise focus, fixing 120 vulnerabilities across…
Fortinet released security advisories on May 12, 2026, addressing five vulnerabilities spanning its wireless access…
A critical security flaw in Fortinet’s FortiSandbox platform is putting enterprise networks at serious risk,…
This website uses cookies.