Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Ivanti Endpoint Manager Mobile Vulnerabilities Allow Attackers to Decrypt Other Users’ Passwords

Posted on July 8, 2025July 8, 2025 By CWS

Ivanti has recognized and resolved three high-severity vulnerabilities in its Endpoint Supervisor (EPM) software program.

If exploited, these flaws might allow attackers to decrypt different customers’ passwords or achieve entry to delicate database data, posing important dangers to organizations that depend on this endpoint administration resolution.

Ivanti Endpoint Supervisor Cell Vulnerabilities

Ivanti’s latest safety replace targets three particular vulnerabilities, every with a excessive severity score primarily based on the Frequent Vulnerability Scoring System (CVSS).

Two of those flaws, recognized as CVE-2025-6995 and CVE-2025-6996, stem from improper use of encryption within the EPM agent. Each carry a CVSS rating of 8.4 (Excessive) and will allow an area authenticated attacker to decrypt passwords of different customers.

The third vulnerability, CVE-2025-7037, includes an SQL injection flaw with a CVSS rating of seven.2 (Excessive), permitting a distant authenticated attacker with admin privileges to learn arbitrary information from the database.

Right here’s an in depth breakdown of the vulnerabilities:

CVE NumberDescriptionCVSS ScoreCVSS VectorCWECVE-2025-6995Improper encryption in EPM agent permits native authenticated attacker to decrypt passwords.8.4 (Excessive)CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:NCWE-257CVE-2025-6996Improper encryption in EPM agent permits native authenticated attacker to decrypt passwords.8.4 (Excessive)CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:NCWE-257CVE-2025-7037SQL injection in EPM permits distant admin attacker to learn database information.7.2 (Excessive)CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HCWE-89

These vulnerabilities have an effect on Ivanti Endpoint Supervisor variations previous to 2024 SU3 and 2022 SU8 Safety Replace 1. The encryption flaws particularly goal the agent part, making native entry a possible gateway for attackers to compromise consumer credentials.

Affected Variations and Options

Ivanti has recognized the next variations of Endpoint Supervisor as weak, with corresponding resolved variations now accessible:

Product NameAffected Model(s)Resolved Model(s)Patch AvailabilityIvanti Endpoint Manager2022 SU8 and prior2022 SU8 Safety Replace 1Download Accessible in ILSIvanti Endpoint Manager2024 SU2 and prior2024 SU3Download Accessible in ILS

Organizations utilizing affected variations are urged to replace instantly to the resolved variations 2024 SU3 or 2022 SU8 Safety Replace 1—accessible by means of Ivanti’s licensing portal (login required). These updates totally mitigate the recognized dangers.

Ivanti has emphasised that there isn’t a proof of lively exploitation of those vulnerabilities previous to their disclosure. The problems had been reported by means of the corporate’s accountable disclosure program, guaranteeing well timed patches earlier than any identified assaults.

Nevertheless, with no public indicators of compromise presently accessible, organizations should stay vigilant and prioritize updates to forestall potential breaches.

The flexibility for attackers to decrypt passwords or entry database data underscores the significance of sturdy endpoint safety. Whereas native entry is required for 2 of the vulnerabilities, the SQL injection flaw opens a distant assault vector for these with admin privileges, broadening the potential risk floor.

IT directors ought to audit their methods for affected variations of Ivanti Endpoint Supervisor and apply the mandatory updates immediately. Moreover, monitoring for uncommon exercise might function a precaution, although no exploitation has been reported.

This incident highlights the continued challenges in securing endpoint administration instruments, that are essential for organizational IT infrastructure.

Examine dwell malware conduct, hint each step of an assault, and make sooner, smarter safety choices -> Strive ANY.RUN now 

Cyber Security News Tags:Attackers, Decrypt, Endpoint, Ivanti, Manager, Mobile, Passwords, Users, Vulnerabilities

Post navigation

Previous Post: How To Defend Against These Phishing Kit Attacks 
Next Post: Legitimate Shellter Pen-Testing Tool Used in Malware Attacks

Related Posts

Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website Cyber Security News
Threat Actors Leverages DeepSeek-R1 Popularity to Attack Users Running Windows Devices Cyber Security News
RapperBot Botnet Attack Peaks 50,000+ Attacks Targeting Network Edge Devices Cyber Security News
Leeds United And Reflectiz Partner To Share Insights On Proactive Web Security After Cyber Attack Cyber Security News
Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale Cyber Security News
Top 5 Best Cybersecurity Companies Leading The Industry Right Now in 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Impostor Uses AI to Impersonate Rubio and Contact Foreign and US Officials
  • Microsoft Releases Cumulative Update for Windows 10 With July Patch Tuesday 2025
  • Nippon Steel Solutions 0-Day Network Vulnerability Exposes Users’ Personal Information
  • Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT Malware
  • Legitimate Shellter Pen-Testing Tool Used in Malware Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Impostor Uses AI to Impersonate Rubio and Contact Foreign and US Officials
  • Microsoft Releases Cumulative Update for Windows 10 With July Patch Tuesday 2025
  • Nippon Steel Solutions 0-Day Network Vulnerability Exposes Users’ Personal Information
  • Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT Malware
  • Legitimate Shellter Pen-Testing Tool Used in Malware Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News