Ivanti Issues Patches for Vulnerabilities in EPMM Software Exploited in Limited Attacks
On May 14, 2025, Ivanti announced critical security updates addressing two vulnerabilities in its Endpoint Manager Mobile (EPMM) software. These flaws have been utilized in limited attacks to facilitate remote code execution, raising significant concerns for businesses relying on this technology for mobile device management.
The first vulnerability, identified as CVE-2025-4427, has a CVSS score of 5.3 and allows for an authentication bypass within the EPMM software. This security gap enables attackers to access restricted resources without the necessary credentials, creating an avenue for unauthorized exploitation. The second vulnerability, CVE-2025-4428, carries a higher CVSS score of 7.2, signifying a more severe threat. This flaw permits attackers to execute arbitrary code on affected systems, significantly heightening the risk of system compromise.
When an attacker successfully exploits both vulnerabilities, they can potentially chain the flaws to execute arbitrary code on a vulnerable device without prior authentication. The impact is particularly pronounced for organizations using specific outdated EPMM versions. Notably, versions 11.12.0.4 and earlier, 12.3.0.1 and earlier, 12.4.0.1 and earlier, and 12.5.0.0 and earlier are affected. All users of these versions are advised to upgrade to their respective patched versions for enhanced security.
The exploits primarily target organizations utilizing Ivanti’s solutions, which are popular among enterprises looking to streamline mobile device management and security. Given the widespread adoption of EPMM, the vulnerabilities pose a comprehensive risk to businesses, potentially leading to data breaches if not addressed promptly.
In terms of the techniques that may have been employed during these attacks, the MITRE ATT&CK framework offers valuable insights. The adversary could have utilized initial access methods exploiting the authentication bypass, followed by persistence tactics to maintain access. The tactics of privilege escalation may also have been relevant, considering the remote code execution capability offered by the second vulnerability.
The attack underscores the imperative for businesses to remain vigilant regarding software vulnerabilities and to ensure that all systems are updated promptly. Security experts consistently stress that proactive measures, including regular software updates and vulnerability assessments, are essential for maintaining robust cybersecurity defenses.
Ivanti’s timely response and the acknowledgment of CERT-EU for reporting these vulnerabilities showcase the importance of collaboration in cybersecurity. As businesses navigate an increasingly complex threat landscape, prioritizing security and staying informed about emerging vulnerabilities is key to mitigating risks effectively.