Ivanti Addresses EPMM Vulnerabilities Leading to Remote Code Execution in Select Attacks

May 14, 2025
Vulnerability / Endpoint Security

Ivanti has issued security updates to remedy two vulnerabilities in its Endpoint Manager Mobile (EPMM) software, which have been exploited in limited attacks for remote code execution. The vulnerabilities include:

  • CVE-2025-4427 (CVSS score: 5.3) – An authentication bypass that enables attackers to access protected resources without valid credentials.
  • CVE-2025-4428 (CVSS score: 7.2) – A remote code execution vulnerability allowing arbitrary code execution on affected systems.

Exploiting these vulnerabilities could allow an attacker to chain them together to execute arbitrary code on a compromised device without authentication. The affected versions of the product are:

  • 11.12.0.4 and earlier (fixed in 11.12.0.5)
  • 12.3.0.1 and earlier (fixed in 12.3.0.2)
  • 12.4.0.1 and earlier (fixed in 12.4.0.2)
  • 12.5.0.0 and earlier (fixed in 12.5.0.1)

Ivanti has credited CERT-EU for reporting these vulnerabilities.

Ivanti Issues Patches for Vulnerabilities in EPMM Software Exploited in Limited Attacks

On May 14, 2025, Ivanti announced critical security updates addressing two vulnerabilities in its Endpoint Manager Mobile (EPMM) software. These flaws have been utilized in limited attacks to facilitate remote code execution, raising significant concerns for businesses relying on this technology for mobile device management.

The first vulnerability, identified as CVE-2025-4427, has a CVSS score of 5.3 and allows for an authentication bypass within the EPMM software. This security gap enables attackers to access restricted resources without the necessary credentials, creating an avenue for unauthorized exploitation. The second vulnerability, CVE-2025-4428, carries a higher CVSS score of 7.2, signifying a more severe threat. This flaw permits attackers to execute arbitrary code on affected systems, significantly heightening the risk of system compromise.

When an attacker successfully exploits both vulnerabilities, they can potentially chain the flaws to execute arbitrary code on a vulnerable device without prior authentication. The impact is particularly pronounced for organizations using specific outdated EPMM versions. Notably, versions 11.12.0.4 and earlier, 12.3.0.1 and earlier, 12.4.0.1 and earlier, and 12.5.0.0 and earlier are affected. All users of these versions are advised to upgrade to their respective patched versions for enhanced security.

The exploits primarily target organizations utilizing Ivanti’s solutions, which are popular among enterprises looking to streamline mobile device management and security. Given the widespread adoption of EPMM, the vulnerabilities pose a comprehensive risk to businesses, potentially leading to data breaches if not addressed promptly.

In terms of the techniques that may have been employed during these attacks, the MITRE ATT&CK framework offers valuable insights. The adversary could have utilized initial access methods exploiting the authentication bypass, followed by persistence tactics to maintain access. The tactics of privilege escalation may also have been relevant, considering the remote code execution capability offered by the second vulnerability.

The attack underscores the imperative for businesses to remain vigilant regarding software vulnerabilities and to ensure that all systems are updated promptly. Security experts consistently stress that proactive measures, including regular software updates and vulnerability assessments, are essential for maintaining robust cybersecurity defenses.

Ivanti’s timely response and the acknowledgment of CERT-EU for reporting these vulnerabilities showcase the importance of collaboration in cybersecurity. As businesses navigate an increasingly complex threat landscape, prioritizing security and staying informed about emerging vulnerabilities is key to mitigating risks effectively.

Source link