Article Details
Scrape Timestamp (UTC): 2025-12-09 17:10:29.562
Original Article Text
Click to Toggle View
Ivanti warns of critical Endpoint Manager code execution flaw. American IT software company Ivanti warned customers today to patch a newly disclosed vulnerability in its Endpoint Manager (EPM) solution that could allow attackers to execute code remotely. Ivanti delivers system and IT asset management solutions to over 40,000 companies via a network of more than 7,000 organizations worldwide. The company's EPM software is an all-in-one endpoint management tool for managing client devices across popular platforms, including Windows, macOS, Linux, Chrome OS, and IoT. Tracked as CVE-2025-10573, this critical security flaw can be exploited by unauthenticated threat actors in low-complexity cross-site scripting attacks that require user interaction. "Stored XSS in Ivanti Endpoint Manager prior to version 2024 SU4 SR1 allows a remote unauthenticated attacker to execute arbitrary JavaScript in the context of an administrator session," Ivanti said. Ivanti noted that the risk of this vulnerability should be significantly reduced because the Ivanti EPM solution is not intended to be exposed online. However, the Shadowserver threat monitoring platform currently tracks hundreds of Internet-facing Ivanti EPM instances, most of which are in the United States (569), Germany (109), and Japan (104). Today, Ivanti also released security updates to address three high-severity vulnerabilities, two of which (CVE-2025-13659 and CVE-2025-13662) could allow unauthenticated attackers to execute arbitrary code on unpatched systems. Luckily, successful exploitation also requires user interaction and the targets to either connect to an untrusted core server or import untrusted configuration files. "We are not aware of any customers being exploited by these vulnerabilities prior to public disclosure. These vulnerabilities were disclosed through our responsible disclosure program," Ivanti added. While Ivanti has yet to discover evidence of exploitation in attacks, Ivanti EPM security flaws are often targeted by threat actors. Earlier this year, in March, CISA tagged three critical vulnerabilities affecting EPM appliances (CVE-2024-13159, CVE-2024-13160, and CVE-2024-13161) as exploited in attacks and warned U.S. federal agencies to secure their networks within three weeks. The U.S. cybersecurity agency ordered government agencies to patch another actively exploited EPM flaw (CVE-2024-29824) in October 2024. Break down IAM silos like Bitpanda, KnowBe4, and PathAI Broken IAM isn't just an IT problem - the impact ripples across your whole business. This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what "good" IAM looks like, and a simple checklist for building a scalable strategy.
Daily Brief Summary
Ivanti has issued a warning to patch a critical vulnerability in its Endpoint Manager (EPM), identified as CVE-2025-10573, which could allow remote code execution.
The flaw affects Ivanti's EPM, a widely used tool for managing client devices across various platforms, including Windows and macOS.
Exploitation requires low-complexity cross-site scripting attacks with user interaction, allowing execution of arbitrary JavaScript in admin sessions.
Despite EPM not being intended for online exposure, hundreds of Internet-facing instances are tracked, primarily in the U.S., Germany, and Japan.
Ivanti has released updates for three high-severity vulnerabilities, emphasizing the need for user interaction to exploit these flaws.
No current evidence suggests exploitation of these vulnerabilities, which were responsibly disclosed, but past EPM flaws have been targeted.
CISA previously flagged several EPM vulnerabilities as exploited, urging U.S. federal agencies to patch them promptly.