Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

ZDI Drops 13 Unpatched Ivanti Endpoint Manager Vulnerabilities

Posted on October 10, 2025October 10, 2025 By CWS

Pattern Micro’s Zero Day Initiative (ZDI) this week revealed 13 advisories describing unpatched vulnerabilities in Ivanti Endpoint Supervisor.

One of many flaws permits native attackers to raise their privileges and was reported to Ivanti in November 2024. The remaining 12 result in distant code execution (RCE) and have been reported in June 2025.

Whereas the vulnerabilities are technically not zero-days, ZDI flags the entire unpatched flaws it discloses as ‘0day’. ZDI’s advisories title the weak element and supply a common description of the basis trigger, however don’t comprise another technical particulars.

No CVE identifier has been issued for these vulnerabilities, however ZDI notes that each one of them are high-severity defects. Essentially the most extreme of them has a CVSS rating of 8.8, one has a CVSS rating of seven.8, whereas the remaining 11 have CVSS scores of seven.2.

In line with ZDI, the native privilege escalation bug impacts the Endpoint Supervisor’s AgentPortal service. It exists as a result of user-supplied enter isn’t correctly validated, leading to deserialization of untrusted knowledge and code execution with System privileges.

Additionally rooted within the lack of correct validation of user-supplied knowledge, the RCE weaknesses have been discovered within the product’s Report_RunPatch, MP_Report_Run2, DBDR, PatchHistory, MP_QueryDetail2, MP_QueryDetail, MP_VistaReport, and Report_Run courses, and within the GetCountForQuery and OnSaveToDB strategies.

For the primary 11 of the RCE vulnerabilities, the improperly validated user-supplied enter is used to assemble SQL queries and will result in arbitrary code execution within the context of the service account. Authentication is required to take advantage of all of them.

For the final RCE challenge (CVSS rating of 8.8), an improperly validated user-supplied path is utilized in file operations, resulting in code execution within the context of the consumer. Attackers can exploit the defect if they’ve admin credentials or if they’ll persuade a consumer to open a malicious web page or file.Commercial. Scroll to proceed studying.

ZDI says Ivanti was notified of the primary safety gap in November 2024 and acknowledged it in January 2025. In July, the seller notified ZDI that patches could be launched in November.

Relating to the RCE flaws, Ivanti initially mentioned it will patch 10 of them in September, however then requested an extension till March 2026 for all 12, ZDI says.

Per its disclosure coverage, ZDI permits distributors 120 days to handle vulnerabilities reported to them. If by the top of the deadline the seller is unresponsive or doesn’t present an inexpensive assertion on why fixes haven’t been launched, ZDI publishes a restricted advisory on the reported safety defect.

“Given the character of the vulnerability, the one salient mitigation technique is to limit interplay with the product,” ZDI notes for every of the bugs. Further data might be discovered on ZDI’s revealed advisories web page.

It’s unclear why Ivanti has not been in a position to roll out patches for these bugs inside the disclosure window, as the corporate has not revealed an advisory but. SecurityWeek has emailed Ivanti for an announcement on the matter and can replace this text if the seller responds.

Associated: Subtle Malware Deployed in Oracle EBS Zero-Day Assaults

Associated: CISA Analyzes Malware From Ivanti EPMM Intrusions

Associated: Chinese language Spies Exploit Ivanti Vulnerabilities In opposition to Essential Sectors

Associated: Broadcom Fails to Disclose Zero-Day Exploitation of VMware Vulnerability

Security Week News Tags:Drops, Endpoint, Ivanti, Manager, Unpatched, Vulnerabilities, ZDI

Post navigation

Previous Post: Active Exploitation Detected in Gladinet and TrioFox Vulnerability
Next Post: Juniper Networks Patches Critical Junos Space Vulnerabilities

Related Posts

Critical Vulnerability Patched in Citrix NetScaler Security Week News
Oracle E-Business Suite Zero-Day Exploited in Cl0p Attacks Security Week News
British Department Store Harrods Warns Customers That Some Personal Details Taken in Data Breach Security Week News
Exploitation of Oracle EBS Zero-Day Started 2 Months Before Patching Security Week News
Sharing Intelligence Beyond CTI Teams, Across Wider Functions and Departments Security Week News
Silent Push Raises $10 Million for Threat Intelligence Platform Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Chaosbot Leveraging CiscoVPN and Active Directory Passwords to Execute Network Commands
  • Threat Actors Exploiting SonicWall SSL VPN Devices in Wild to Deploy Akira Ransomware
  • Nanoprecise partners with AccuKnox to strengthen its Zero Trust Cloud Security and Compliance Posture
  • Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers
  • In Other News: Gladinet Flaw Exploitation, Attacks on ICS Honeypot, ClayRat Spyware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Chaosbot Leveraging CiscoVPN and Active Directory Passwords to Execute Network Commands
  • Threat Actors Exploiting SonicWall SSL VPN Devices in Wild to Deploy Akira Ransomware
  • Nanoprecise partners with AccuKnox to strengthen its Zero Trust Cloud Security and Compliance Posture
  • Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers
  • In Other News: Gladinet Flaw Exploitation, Attacks on ICS Honeypot, ClayRat Spyware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News