Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Ivanti Endpoint Manager Vulnerabilities Let Attackers Execute Remote Code

Posted on September 9, 2025September 9, 2025 By CWS

Ivanti has launched safety updates to deal with two high-severity vulnerabilities in its Endpoint Supervisor (EPM) software program that would permit distant code execution. The vulnerabilities, tracked as CVE-2025-9712 and CVE-2025-9872, have an effect on a number of variations of the product.

The corporate has acknowledged that it’s not conscious of any lively exploitation of those flaws within the wild on the time of disclosure.

Each CVE-2025-9712 and CVE-2025-9872 have been assigned a CVSS rating of 8.8 out of 10.0, categorizing them as high-severity. The foundation explanation for each flaws is an inadequate filename validation weak spot, cataloged as CWE-434 (Unrestricted Add of File with Harmful Sort).

Such a vulnerability can permit an attacker to add a file with a malicious or sudden kind, which may then be executed on the goal system.

For a profitable assault, a distant, unauthenticated menace actor would wish to trick a person into interacting with a specifically crafted file. This person interplay is a vital prerequisite for exploitation.

If an attacker efficiently exploits both vulnerability, they might obtain distant code execution (RCE) on the affected system, granting them the flexibility to compromise the confidentiality, integrity, and availability of the system.

The CVSS vector, AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, confirms that the assault may be launched remotely over a community, requires low complexity, wants no privileges, however depends upon person interplay.

Affected Variations and Patches

The vulnerabilities impression Ivanti Endpoint Supervisor variations 2022 SU8 Safety Replace 1 and prior, in addition to 2024 SU3 and prior variations. Ivanti has made patches obtainable to resolve these points.

Directors are strongly suggested to improve to the next safe variations: Ivanti Endpoint Supervisor 2022 SU8 Safety Replace 2 and Ivanti Endpoint Supervisor 2024 SU3 Safety Replace 1. The safety updates may be accessed by means of the Ivanti License System portal.

Actually, here’s a desk detailing the affected and patched variations of Ivanti Endpoint Supervisor.

Product NameAffected Model(s)Patched Model(s)Ivanti Endpoint Manager2024 SU3 and prior2024 SU3 Safety Replace 1Ivanti Endpoint Manager2022 SU8 Safety Replace 1 and prior2022 SU8 Safety Replace 2

Including a layer of urgency, Ivanti has reminded clients that the 2022 product department is scheduled to achieve its Finish of Life (EOL) on the finish of October 2025.

Organizations nonetheless utilizing this department are inspired not solely to use the quick safety repair but in addition to plan a migration to a totally supported model to proceed receiving safety updates and technical assist.

Ivanti has confirmed that these vulnerabilities had been reported by means of its accountable disclosure program. The corporate credited a researcher, recognized as “06fe5fd2bc53027c4a3b7e395af0b850e7b8a044,” working with Pattern Micro’s Zero Day Initiative for locating and reporting each flaws. As a result of the problems had been disclosed responsibly, Ivanti has not discovered any proof of lively exploitation or compromise.

Consequently, there are not any particular indicators of compromise (IoCs) obtainable for directors to seek for. Regardless of the absence of identified assaults, directors are urged to use the patches promptly, as menace actors typically reverse-engineer safety updates to develop exploits for unpatched techniques.

Discover this Story Attention-grabbing! Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates.

Cyber Security News Tags:Attackers, Code, Critical, Endpoint, Execute, Ivanti, Manager, Remote, Vulnerabilities

Post navigation

Previous Post: Police Body Camera Apps Sending Data to Cloud Servers Hosted in China Via TLS Port 9091
Next Post: Top 10 Best Penetration Testing as a Service (PTaaS) Companies in 2025

Related Posts

LockBit Operators Using Stealthy DLL Sideloading Technique to Load Malicious App as Legitimate One Cyber Security News
Google to Flag Apps on Play Store that Use Excessive Amount of battery Cyber Security News
PoC exploit Released for VMware Workstation guest-to-host escape Vulnerability Cyber Security News
A Multi-Stage Phishing Kit Using Telegram to Harvest Credentials and Bypass Automated Detection Cyber Security News
New JSCEAL Attack Targeting Crypto App Users To Steal Credentials and Wallets Cyber Security News
Threat Actors Exploiting Black Friday Shopping Hype Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 175,000 Exposed Ollama Hosts Could Enable LLM Abuse
  • TAMECAT PowerShell-Based Backdoor Exfiltrates Login Credentials from Microsoft Edge and Chrome
  • Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access
  • Attackers Hijacked 200+ Websites Exploiting Magento Vulnerability to Gain Root-level Access
  • White House Scraps ‘Burdensome’ Software Security Rules 

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 175,000 Exposed Ollama Hosts Could Enable LLM Abuse
  • TAMECAT PowerShell-Based Backdoor Exfiltrates Login Credentials from Microsoft Edge and Chrome
  • Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access
  • Attackers Hijacked 200+ Websites Exploiting Magento Vulnerability to Gain Root-level Access
  • White House Scraps ‘Burdensome’ Software Security Rules 

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark