Original Article Text

Click to Toggle View

Ivanti fixes EPMM zero-days chained in code execution attacks. Ivanti warned customers today to patch their Ivanti Endpoint Manager Mobile (EPMM) software against two security vulnerabilities chained in attacks to gain remote code execution. "Ivanti has released updates for Endpoint Manager Mobile (EPMM) which addresses one medium and one high severity vulnerability," the company said. "When chained together, successful exploitation could lead to unauthenticated remote code execution. We are aware of a very limited number of customers whose solution has been exploited at the time of disclosure." The first security flaw (CVE-2025-4427) is an authentication bypass in EPMM's API component, allowing attackers to access protected resources on vulnerable devices. The second (tracked as CVE-2025-4428) is a remote code execution vulnerability that allows threat actors to execute arbitrary code on targeted systems via maliciously crafted API requests. Ivanti says customers can mitigate the two zero-day flaws by installing Ivanti Endpoint Manager Mobile 11.12.0.5, 12.3.0.2, 12.4.0.2, or 12.5.0.1. The company added that, while it's still investigating these attacks and can't provide indicators of compromise, customers should reach out to the support team for further guidance. While Ivanti said the two vulnerabilities are "associated" with two open-source libraries used by EPMM, it didn't share their names in the advisory. A spokesperson directed BleepingComputer to today's advisory for further information. "The issue only affects the on-prem EPMM product. It is not present in Ivanti Neurons for MDM, Ivanti's cloud-based unified endpoint management solution, Ivanti Sentry, or any other Ivanti products," Ivanti added in a separate advisory. "We urge all customers using the on-prem EPMM product to promptly install the patch." The Shadowserver threat monitoring platform currently tracks hundreds of Ivanti EPMM instances exposed online, most in Germany (992) and the United States (418). ​Today, Ivanti also released security updates to address a critical authentication bypass vulnerability (CVE-2025-22462) impacting its Neurons for ITSM IT service management solution that can let unauthenticated attackers gain administrative access. It also urged customers to patch a default credentials flaw (CVE-2025-22460) in its Cloud Services Appliance (CSA) that lets local authenticated attackers escalate privileges on vulnerable systems. In recent years, multiple other security vulnerabilities have been exploited in zero-day attacks targeting Ivanti's VPN appliances and ICS, IPS, and ZTA gateways. The FBI and CISA also warned in a joint advisory issued in January that threat actors are still exploiting months-old Ivanti Cloud Service Appliances (CSA) security vulnerabilities to breach vulnerable networks. Top 10 MITRE ATT&CK© Techniques Behind 93% of Attacks Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.

Daily Brief Summary

MALWARE // Ivanti Patches Critical Vulnerabilities in Endpoint Manager Mobile

Ivanti has issued updates for its Endpoint Manager Mobile (EPMM) to address two zero-day vulnerabilities that could allow remote code execution.

The vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, involve an authentication bypass and a remote code execution flaw, respectively.

Attackers could exploit these vulnerabilities by chaining them to execute arbitrary code unauthenticated.

While the exploitation has been limited to a few incidents, Ivanti urges customers to install the relevant patches for their on-prem EPMM products immediately.

The identified vulnerabilities are linked to two unnamed open-source libraries used by EPMM.

Ivanti has advised customers to contact their support team for further guidance and has confirmed that other products like Ivanti Neurons for MDM are not affected.

The advisory also notes that hundreds of Ivanti EPMM instances remain exposed online, especially in Germany and the United States.