Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Ivanti Patches 13 Vulnerabilities in Endpoint Manager Allowing Remote Code Execution

Posted on October 14, 2025October 14, 2025 By CWS

Ivanti has disclosed 13 vulnerabilities in its Endpoint Supervisor (EPM) software program, together with two high-severity flaws that might allow distant code execution and privilege escalation, urging prospects to use mitigations whereas patches stay in growth.

The announcement comes amid rising scrutiny of enterprise administration instruments, as attackers more and more goal them for provide chain compromises.

Though no exploitation within the wild has been reported, the problems spotlight the dangers of outdated deployments in endpoint safety environments.

Crucial Vulnerabilities Uncovered In Endpoint Supervisor

Among the many vulnerabilities, CVE-2025-9713 stands out as a high-severity path traversal subject with a CVSS rating of 8.8, permitting unauthenticated distant attackers to execute arbitrary code if customers work together with malicious recordsdata.

This flaw, rooted in CWE-22, exploits weak enter validation throughout configuration imports, doubtlessly letting adversaries add and run malicious payloads on the EPM Core server.

Complementing it’s CVE-2025-11622, an insecure deserialization vulnerability (CVSS 7.8, CWE-502) that allows native authenticated customers to escalate privileges, granting unauthorized entry to delicate system sources.

The remaining 11 vulnerabilities are medium-severity SQL injection flaws (every CVSS 6.5, CWE-89), resembling CVE-2025-11623 and CVE-2025-62392 by means of CVE-2025-62384.

CVE IDDescriptionCVSS ScoreSeverityCVSS VectorCWECVE-2025-11622Insecure deserialization permitting native authenticated privilege escalation.7.8HighCVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H502CVE-2025-9713Path traversal permitting distant unauthenticated RCE with consumer interplay.8.8HighCVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H22CVE-2025-11623SQL injection permitting distant authenticated arbitrary knowledge learn.6.5MediumCVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N89CVE-2025-62392SQL injection permitting distant authenticated arbitrary knowledge learn.6.5MediumCVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N89CVE-2025-62390SQL injection permitting distant authenticated arbitrary knowledge learn.6.5MediumCVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N89CVE-2025-62389SQL injection permitting distant authenticated arbitrary knowledge learn.6.5MediumCVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N89CVE-2025-62388SQL injection permitting distant authenticated arbitrary knowledge learn.6.5MediumCVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N89CVE-2025-62387SQL injection permitting distant authenticated arbitrary knowledge learn.6.5MediumCVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N89CVE-2025-62385SQL injection permitting distant authenticated arbitrary knowledge learn.6.5MediumCVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N89CVE-2025-62391SQL injection permitting distant authenticated arbitrary knowledge learn.6.5MediumCVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N89CVE-2025-62383SQL injection permitting distant authenticated arbitrary knowledge learn.6.5MediumCVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N89CVE-2025-62386SQL injection permitting distant authenticated arbitrary knowledge learn.6.5MediumCVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N89CVE-2025-62384SQL injection permitting distant authenticated arbitrary knowledge learn.6.5MediumCVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N89

These enable distant authenticated attackers to extract arbitrary knowledge from the database, together with credentials or configuration particulars, with no need consumer interplay past preliminary authentication.

Ivanti famous that each one points have been responsibly reported by researcher 06fe5fd2bc53027c4a3b7e395af0b850e7b8a044 through Development Micro’s Zero Day Initiative, underscoring the worth of coordinated disclosure in bolstering defenses.

No proof-of-concept exploits or indicators of compromise (IoCs) have been publicly launched, as Ivanti confirmed no lively assaults at disclosure time.

Nevertheless, the potential for knowledge exfiltration through SQL injections might assist broader campaigns, much like previous incidents focusing on administration consoles like these from SolarWinds or Log4j.

Ivanti EPM variations 2024 SU3 SR1 and earlier are affected, with the 2022 department now end-of-life as of October 2025, leaving customers with out official help.

For the high-severity CVEs, fixes are slated for EPM 2024 SU4, anticipated November 12, 2025. The SQL injections will comply with in SU5 throughout Q1 2026, delayed as a result of complexity of resolving them with out disrupting reporting options.

Ivanti emphasised that upgrading to the newest 2024 launch already mitigates a lot of the chance by means of enhanced safety controls. Clients on EOL variations face heightened publicity and will migrate promptly to keep away from unpatched vulnerabilities.

The corporate’s FAQ addresses issues, noting that whereas patches are forthcoming, rapid mitigations can safe environments within the interim.

Mitigations

To counter CVE-2025-11622, Ivanti recommends firewall whitelisting to dam high-range TCP ports and limiting Core server entry to native EPM directors solely, aligning with established finest practices.

For the trail traversal in CVE-2025-9713, customers should keep away from importing untrusted configuration recordsdata and totally vet any essential ones, as such actions inherently carry dangers.

The SQL injection cluster might be addressed by eradicating the Reporting database consumer, although this disables analytics options, a trade-off detailed in Ivanti’s documentation. General, staying on EPM 2024 SU3 SR1 or later supplies layered protections, lowering exploit viability.

Ivanti’s disclosure, regardless of pending patches, prioritizes transparency, permitting proactive defenses in a panorama the place endpoint managers are prime targets for ransomware and APT teams. Organizations ought to audit their EPM setups and seek the advice of Ivanti’s Success Portal for tailor-made help.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Allowing, Code, Endpoint, Execution, Ivanti, Manager, Patches, Remote, Vulnerabilities

Post navigation

Previous Post: New PoC Exploit Released for Sudo Chroot Privilege Escalation Vulnerability
Next Post: Windows 10 Still on Over 40% of Devices as It Reaches End of Support

Related Posts

North Korean Hackers Attacking Developers with 338 Malicious npm Packages Cyber Security News
Numerous Applications Using Google’s Firebase Platform Leaking Highly Sensitive Data Cyber Security News
20 Best Inventory Management Tools in 2025 Cyber Security News
Lazarus Hackers Weaponized 234 Packages Across npm and PyPI to Infect Developers Cyber Security News
Top 10 Best Model Context Protocol (MCP) Servers in 2025 Cyber Security News
Linux Kernel Patching: Preventing Exploits in 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • PolarEdge With Custom TLS Server Uses Custom Binary Protocol for C2 Communication
  • New Cyberattack Leverages NPM Ecosystem to Infect Developers While Installing Packages
  • Hackers Leverage Judicial Notifications to Deploy Info-Stealer Malware
  • Microsoft October 2025 Patch Tuesday – 4 Zero-days and 172 Vulnerabilities Patched
  • Support for Windows 10 Ends Today Leaving Users Vulnerable to Cyberattacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • PolarEdge With Custom TLS Server Uses Custom Binary Protocol for C2 Communication
  • New Cyberattack Leverages NPM Ecosystem to Infect Developers While Installing Packages
  • Hackers Leverage Judicial Notifications to Deploy Info-Stealer Malware
  • Microsoft October 2025 Patch Tuesday – 4 Zero-days and 172 Vulnerabilities Patched
  • Support for Windows 10 Ends Today Leaving Users Vulnerable to Cyberattacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News