Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Wiz Warns of Ongoing Exploitation of Recent Ivanti Vulnerabilities

Wiz Warns of Ongoing Exploitation of Recent Ivanti Vulnerabilities

Posted on May 21, 2025May 21, 2025 By CWS

Cybersecurity agency Wiz says risk actors are actively exploiting within the wild two not too long ago patched Ivanti Endpoint Supervisor Cellular (EPMM) vulnerabilities.

Tracked as CVE-2025-4427 and CVE-2025-4428, the issues are described as an authentication bypass and a post-authentication distant code execution (RCE) concern, and have been assessed with ‘medium severity’ rankings. They had been present in two open supply libraries built-in into EPMM.

Ivanti launched fixes for each bugs on Could 13, warning of zero-day exploitation in opposition to a restricted variety of clients and noting that the danger of compromise is considerably decreased if ACLs performance within the portal or an exterior WAF is used to filter entry to the API.

The authentication bypass, Wiz explains, exists as a result of EPMM’s route configuration doesn’t correctly deal with requests, exposing routes with out authentication attributable to lacking guidelines within the Spring framework’s safety configuration.

The RCE bug exists as a result of user-supplied enter inside error messages is dealt with unsafely when processed by way of a Spring operate, permitting an attacker to craft a format parameter and execute arbitrary Java code.

In accordance with Wiz, whereas every of the 2 safety defects is a medium-severity vulnerability, their mixture needs to be handled as a important safety threat.

“These flaws, which stem from unsafe use of Java Expression Language in error messages and misconfigured routing, could be exploited collectively to realize unauthenticated RCE,” Wiz notes.

The cybersecurity agency says it has noticed ongoing in-the-wild exploitation of those flaws since Could 16, after proof-of-concept (PoC) exploit code was revealed.Commercial. Scroll to proceed studying.

Wiz recognized a number of payloads deployed as a part of the noticed assaults, together with a Sliver beacon connecting to a command-and-control (C&C) IP deal with beforehand linked to the exploitation of different susceptible home equipment, together with Palo Alto Networks merchandise operating PAN-OS.

“It seems that this IP deal with remains to be in operation by the risk actor, as its certificates hasn’t modified since November 2024. This continuity leads us to conclude that the identical actor has been opportunistically focusing on each PAN-OS and Ivanti EPMM home equipment,” Wiz says.

Organizations are suggested to replace their Ivanti EPMM deployments to one of many patched variations, which embody 11.12.0.5, 12.3.0.2, 12.4.0.2, and 12.5.0.1.

Associated: Fortinet Patches Zero-Day Exploited Towards FortiVoice Home equipment

Associated: SAP Patches One other Exploited NetWeaver Vulnerability

Associated: Output Messenger Zero-Day Exploited by Turkish Hackers for Iraq Spying

Associated: Second OttoKit Vulnerability Exploited to Hack WordPress Websites

Security Week News Tags:Exploitation, Ivanti, Ongoing, Vulnerabilities, Warns, Wiz

Post navigation

Previous Post: Virtual Event Today: Threat Detection & Incident Response (TDIR) Summit
Next Post: Google DeepMind Unveils Defense Against Indirect Prompt Injection Attacks

Related Posts

Fresh MongoDB Vulnerability Exploited in Attacks Fresh MongoDB Vulnerability Exploited in Attacks Security Week News
Defakto Raises  Million for Non-Human IAM Platform Defakto Raises $30 Million for Non-Human IAM Platform Security Week News
Nevada Confirms Ransomware Attack Behind Statewide Service Disruptions Nevada Confirms Ransomware Attack Behind Statewide Service Disruptions Security Week News
RaccoonO365 Phishing Service Disrupted, Leader Identified RaccoonO365 Phishing Service Disrupted, Leader Identified Security Week News
Chinese Hacking Group ‘Earth Lamia’ Targets Multiple Industries Chinese Hacking Group ‘Earth Lamia’ Targets Multiple Industries Security Week News
Tycoon 2FA Resumes Activity After Global Law Enforcement Disruption Tycoon 2FA Resumes Activity After Global Law Enforcement Disruption Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark