Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Ivanti Endpoint Manager Vulnerabilities Let Attackers Execute Remote Code

Posted on September 9, 2025September 9, 2025 By CWS

Ivanti has launched safety updates to deal with two high-severity vulnerabilities in its Endpoint Supervisor (EPM) software program that would permit distant code execution. The vulnerabilities, tracked as CVE-2025-9712 and CVE-2025-9872, have an effect on a number of variations of the product.

The corporate has acknowledged that it’s not conscious of any lively exploitation of those flaws within the wild on the time of disclosure.

Each CVE-2025-9712 and CVE-2025-9872 have been assigned a CVSS rating of 8.8 out of 10.0, categorizing them as high-severity. The foundation explanation for each flaws is an inadequate filename validation weak spot, cataloged as CWE-434 (Unrestricted Add of File with Harmful Sort).

Such a vulnerability can permit an attacker to add a file with a malicious or sudden kind, which may then be executed on the goal system.

For a profitable assault, a distant, unauthenticated menace actor would wish to trick a person into interacting with a specifically crafted file. This person interplay is a vital prerequisite for exploitation.

If an attacker efficiently exploits both vulnerability, they might obtain distant code execution (RCE) on the affected system, granting them the flexibility to compromise the confidentiality, integrity, and availability of the system.

The CVSS vector, AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, confirms that the assault may be launched remotely over a community, requires low complexity, wants no privileges, however depends upon person interplay.

Affected Variations and Patches

The vulnerabilities impression Ivanti Endpoint Supervisor variations 2022 SU8 Safety Replace 1 and prior, in addition to 2024 SU3 and prior variations. Ivanti has made patches obtainable to resolve these points.

Directors are strongly suggested to improve to the next safe variations: Ivanti Endpoint Supervisor 2022 SU8 Safety Replace 2 and Ivanti Endpoint Supervisor 2024 SU3 Safety Replace 1. The safety updates may be accessed by means of the Ivanti License System portal.

Actually, here’s a desk detailing the affected and patched variations of Ivanti Endpoint Supervisor.

Product NameAffected Model(s)Patched Model(s)Ivanti Endpoint Manager2024 SU3 and prior2024 SU3 Safety Replace 1Ivanti Endpoint Manager2022 SU8 Safety Replace 1 and prior2022 SU8 Safety Replace 2

Including a layer of urgency, Ivanti has reminded clients that the 2022 product department is scheduled to achieve its Finish of Life (EOL) on the finish of October 2025.

Organizations nonetheless utilizing this department are inspired not solely to use the quick safety repair but in addition to plan a migration to a totally supported model to proceed receiving safety updates and technical assist.

Ivanti has confirmed that these vulnerabilities had been reported by means of its accountable disclosure program. The corporate credited a researcher, recognized as “06fe5fd2bc53027c4a3b7e395af0b850e7b8a044,” working with Pattern Micro’s Zero Day Initiative for locating and reporting each flaws. As a result of the problems had been disclosed responsibly, Ivanti has not discovered any proof of lively exploitation or compromise.

Consequently, there are not any particular indicators of compromise (IoCs) obtainable for directors to seek for. Regardless of the absence of identified assaults, directors are urged to use the patches promptly, as menace actors typically reverse-engineer safety updates to develop exploits for unpatched techniques.

Discover this Story Attention-grabbing! Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates.

Cyber Security News Tags:Attackers, Code, Critical, Endpoint, Execute, Ivanti, Manager, Remote, Vulnerabilities

Post navigation

Previous Post: Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks
Next Post: FortiDDoS OS Command Injection Vulnerability Let Attackers Execute Unauthorized Commands

Related Posts

ScarCruft Hacker Group Launched a New Malware Attack Using Rust and PubNub Cyber Security News
Help TDS Weaponize Legitimate Sites’ PHP Code Templates With Fake Microsoft Windows Security Alert Pages Cyber Security News
AI Coding Assistant Creating a Perfect Blueprints for Attackers Cyber Security News
Windows Docker Desktop Vulnerability Leads to Full Host Compromise Cyber Security News
New Ghost Calls Attack Abuses Web Conferencing for Covert Command & Control Cyber Security News
Hackers Actively Exploiting CitrixBleed 2 Vulnerability in the Wild Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Patches 86 Vulnerabilities – SecurityWeek
  • Adobe Patches Critical ColdFusion and Commerce Vulnerabilities
  • How to Enrich Alerts with Live Attack Data from 15K SOCs 
  • Microsoft September 2025 Patch Tuesday
  • Salat Stealer Exfiltrates Browser Credentials Via Sophisticated C2 Infrastructure

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Patches 86 Vulnerabilities – SecurityWeek
  • Adobe Patches Critical ColdFusion and Commerce Vulnerabilities
  • How to Enrich Alerts with Live Attack Data from 15K SOCs 
  • Microsoft September 2025 Patch Tuesday
  • Salat Stealer Exfiltrates Browser Credentials Via Sophisticated C2 Infrastructure

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News