Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Ivanti EPM Update Patches Critical Remote Code Execution Flaw

Posted on December 10, 2025December 11, 2025 By CWS

Ivanti on Tuesday introduced patches for 4 vulnerabilities in Endpoint Supervisor (EPM), together with a critical-severity flaw resulting in distant code execution (RCE).

The safety defect, tracked as CVE-2025-10573 (CVSS rating of 9.6), is described as a saved cross-site scripting (XSS) challenge that may be exploited with out authentication.

Offering organizations with distant administration, vulnerability scanning, and administration of linked techniques, Ivanti EPM consists of an API that consumes gadget scan knowledge.

The vital EPM vulnerability permits attackers to submit gadget scan knowledge containing malicious payloads that might be processed and embedded within the internet dashboard, says Rapid7, which found and reported the bug in August.

When an administrator accesses the dashboard interface and views the gadget data, the payload triggers client-side JavaScript execution, permitting the attacker to realize management of the administrator’s session, the corporate explains.

The bug has been addressed with the discharge of Ivanti EPM 2024 SU4 SR1, which additionally addresses three high-severity bugs.

The primary, CVE-2025-13659, is described because the improper management of dynamically managed code assets, which may permit distant, unauthenticated attackers to put in writing arbitrary recordsdata on the server.

Profitable exploitation of the safety defect may result in RCE, however person interplay is required, Ivanti notes in its advisory.Commercial. Scroll to proceed studying.

The second high-severity challenge is CVE-2025-13661, a path traversal flaw that may be exploited remotely to put in writing arbitrary recordsdata exterior of the meant listing. Its exploitation requires authentication.

The third high-severity weak point is described because the “improper verification of cryptographic signatures within the patch administration part” of EPM.

Tracked as CVE-2025-13662, it permits distant, unauthenticated attackers to realize RCE, however requires person interplay.

Ivanti says it isn’t conscious of any of those vulnerabilities being exploited within the wild. Customers are suggested to replace to the most recent variations of Ivanti EPM as quickly as potential.

Associated: Excessive-Severity Vulnerabilities Patched by Ivanti and Zoom

Associated: Excessive-Severity Vulnerabilities Patched by Fortinet and Ivanti

Associated: ZDI Drops 13 Unpatched Ivanti Endpoint Supervisor Vulnerabilities

Associated: CISA Analyzes Malware From Ivanti EPMM Intrusions

Security Week News Tags:Code, Critical, EPM, Execution, Flaw, Ivanti, Patches, Remote, Update

Post navigation

Previous Post: SAP Patches Critical Vulnerabilities With December 2025 Security Updates
Next Post: WinRAR Vulnerability CVE-2025-6218 Under Active Attack by Multiple Threat Groups

Related Posts

Carding Marketplace BidenCash Shut Down by Authorities  Security Week News
American Airlines Subsidiary Envoy Air Hit by Oracle Hack Security Week News
Cyera Raises $540 Million to Expand AI-Powered Data Security Platform Security Week News
US Sanctions North Korean Bankers Accused of Laundering Stolen Cryptocurrency Security Week News
$320,000 Paid Out at Zeroday.Cloud for Open Source Software Exploits Security Week News
Hirundo Raises $8 Million to Eliminate AI’s Bad Behavior Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FreePBX Patches Critical SQLi, File-Upload, and AUTHTYPE Bypass Flaws Enabling RCE
  • Wireshark 4.6.2 Released With Fix for Vulnerabilities, and Updated Protocol Support
  • New ARTEMIS AI Agent Outperformed 9 out of 10 Human Penetration Testers in Detecting Vulnerabilities
  • Google Sees 5 Chinese Groups Exploiting React2Shell for Malware Delivery
  • Apple 0-Days, WinRAR Exploit, LastPass Fines, .NET RCE, OAuth Scams & More

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FreePBX Patches Critical SQLi, File-Upload, and AUTHTYPE Bypass Flaws Enabling RCE
  • Wireshark 4.6.2 Released With Fix for Vulnerabilities, and Updated Protocol Support
  • New ARTEMIS AI Agent Outperformed 9 out of 10 Human Penetration Testers in Detecting Vulnerabilities
  • Google Sees 5 Chinese Groups Exploiting React2Shell for Malware Delivery
  • Apple 0-Days, WinRAR Exploit, LastPass Fines, .NET RCE, OAuth Scams & More

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark