Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Ivanti Patches Two EPMM Zero-Days Exploited to Hack Customers

Posted on May 14, 2025May 14, 2025 By CWS

Ivanti on Tuesday introduced patches for 3 vulnerabilities in its merchandise, together with two Endpoint Supervisor Cell (EPMM) bugs which have been chained within the wild.

The exploited zero-day flaws, tracked as CVE-2025-4427 (CVSS rating of 5.3) and CVE-2025-4428 (CVSS rating of seven.2), are described as an authentication bypass subject and a distant code execution (RCE) defect impacting two open supply libraries built-in into EPMM. They allow a distant, unauthenticated attacker to execute arbitrary code.

The corporate says it’s working with the maintainers of the affected libraries to evaluate the influence on the open supply dependencies and whether or not extra CVEs needs to be assigned.

“We’re conscious of a really restricted variety of prospects whose answer has been exploited on the time of disclosure,” Ivanti notes in its advisory.

The danger of compromise, the corporate says, is considerably diminished if entry to the API is filtered utilizing ACLs performance within the portal or an exterior WAF.

Patches for the zero-days have been included in EPMM variations 11.12.0.5, 12.3.0.2, 12.4.0.2, and 12.5.0.1. All customers of Ivanti’s on-prem EPMM product are urged to promptly set up the patch.

“We have now made extra sources and assist groups out there to help prospects in implementing the patch and addressing any issues. Detailed data is offered in our Safety Advisory in order that prospects can defend their atmosphere,” Ivanti mentioned.

Moreover, the corporate launched fixes for 3 bugs in Neurons for ITSM, Cloud Safety Utility (CSA), and Ivanti Neurons for MDM (N-MDM). None of those seems to be exploited in assaults, the corporate says.Commercial. Scroll to proceed studying.

The repair for Neurons for ITSM (on-premise solely) resolves CVE-2025-22462 (CVSS rating of 9.8), a critical-severity authentication bypass flaw that would enable a distant attacker to acquire administrative privileges.

Ivanti additionally patched CVE-2025-22460, a high-severity default credentials subject in CSA that would enable an area attacker to raise their privileges, and a medium-severity improper authorization defect in N-MDM (with no CVE identifier assigned) that would enable distant, unauthenticated attackers to tamper with sources.

Associated: Vulnerabilities Patched by Ivanti, VMware, Zoom

Associated: Exploited Vulnerability Places 5,000 Ivanti VPN Home equipment at Danger

Associated: Chinese language APT Pounces on Misdiagnosed RCE in Ivanti VPN Home equipment

Associated: CISA Analyzes Malware Utilized in Ivanti Zero-Day Assaults

Security Week News Tags:Customers, EPMM, Exploited, Hack, Ivanti, Patches, ZeroDays

Post navigation

Previous Post: ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Phoenix Contact 
Next Post: Microsoft Fixes 78 Flaws, 5 Zero-Days Exploited; CVSS 10 Bug Impacts Azure DevOps Server

Related Posts

Flaw in Industrial Computer Maker’s UEFI Apps Enables Secure Boot Bypass on Many Devices Security Week News
Signal Adds Screenshot-Blocker to Thwart ‘Windows Recall’  Security Week News
ClickFix Attack Exploits Fake Cloudflare Turnstile to Deliver Malware Security Week News
Swimlane Raises $45 Million for Security Automation Platform Security Week News
High-Severity Vulnerabilities Patched in Tenable Nessus Agent Security Week News
Beyond GenAI: Why Agentic AI Was the Real Conversation at RSA 2025 Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News