Ivanti, Fortinet, and Splunk on Tuesday introduced patches for dozens of vulnerabilities throughout their product portfolios, together with critical- and high-severity flaws.
Safety updates launched for Ivanti Join Safe (ICS) and Coverage Safe (IPS), Endpoint Supervisor Cell (EPMM), and Endpoint Supervisor (EPM) resolve a complete of 11 bugs that require authentication to be exploited.
The EPM replace resolves three high-severity defects that might permit attackers to decrypt different customers’ passwords or learn arbitrary knowledge from the database, whereas the EPMM refresh fixes two high-severity OS command injection flaws resulting in distant code execution.
Ivanti fastened six medium-severity points in ICS and IPS, warning they may very well be exploited to change restricted settings, trigger a denial-of-service (DoS) situation, extract delicate info from log information, write to a protected configuration file on disk, and entry inner community providers.
“We’ve got no proof of any of those vulnerabilities being exploited within the wild,” Ivanti notes in its advisory.
On Tuesday, Fortinet printed eight advisories detailing one critical-, one high-, 5 medium-, and one low-severity vulnerability impacting FortiAnalyzer, FortiIsolator, FortiManager, FortiOS, FortiProxy, FortiSandbox, FortiSASE, FortiVoice, and FortiWeb.
Tracked as CVE-2025-25257 (CVSS rating of 9.6), the vital bug is an SQL injection flaw in FortiWeb that may very well be exploited through crafted HTTP or HTTPS requests to execute unauthorized SQL code or instructions. No authentication is required for profitable exploitation.
Crafted HTTP/HTTPS or CLI requests may be used to take advantage of two high-severity OS command injection defects in FortiVoice. Tracked as CVE-2025-47856 (CVSS rating of seven.2), these points might permit a privileged attacker to run arbitrary code or instructions.Commercial. Scroll to proceed studying.
Fortinet makes no point out of any of the newly addressed vulnerabilities being exploited within the wild. Extra info will be discovered on the corporate’s PSIRT advisories web page.
An important of the 12 advisories that Splunk printed this week resolve critical- and high-severity flaws in third-party dependencies in Splunk SOAR, Enterprise, and DB Join. Most of those are bugs disclosed final 12 months, with a number of 2022 and 2023 CVEs additionally resolved. One difficulty was disclosed in 2013.
Moreover, the corporate introduced fixes for seven medium- and one low-severity difficulty in Splunk Enterprise that may very well be exploited to execute instructions remotely, trigger a DoS situation, change SHC membership state, disable the scheduled search throughout the Archiver utility, create or overwrite system supply sort configurations, suppress a selected alert, and expose the search head cluster splunk.secret key.
Associated: Microsoft Patches 130 Vulnerabilities for July 2025 Patch Tuesday
Associated: Adobe Patches Important Code Execution Bugs
Associated: SAP Patches Important Flaws That May Enable Distant Code Execution, Full System Takeover
Associated: Grafana Patches Chromium Bugs, Together with Zero-Day Exploited within the Wild