Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Patch for Code Execution Vulnerabilities in Endpoint Manager

Patch for Code Execution Vulnerabilities in Endpoint Manager

Posted on December 9, 2025December 9, 2025 By CWS

Ivanti has formally launched pressing safety updates for its Endpoint Supervisor (EPM) answer to deal with 4 distinct safety flaws. The newest advisory highlights one crucial vulnerability and three high-severity points that might enable attackers to execute arbitrary code, write recordsdata on the server, or bypass safety restrictions.

Whereas the corporate confirmed that it’s not conscious of any lively exploitation of those flaws within the wild on the time of disclosure, directors are urged to use the patches instantly to stop potential assaults.

The vulnerabilities have an effect on Ivanti Endpoint Supervisor variations 2024 SU4 and prior. To remediate these points, the seller has launched model 2024 SU4 SR1, which is now accessible through the Ivanti License System (ILS).

Probably the most extreme challenge on this replace is tracked as CVE-2025-10573, a Saved Cross-Website Scripting (XSS) vulnerability carrying a crucial CVSS rating of 9.6.

This flaw exists in variations previous to 2024 SU4 SR1 and permits a distant, unauthenticated attacker to execute arbitrary JavaScript inside an administrator’s session.

Profitable exploitation of this vulnerability requires consumer interplay, however the potential affect on administrative confidentiality and integrity is important.

Alongside this crucial flaw, Ivanti addressed three high-severity vulnerabilities. CVE-2025-13659 entails improper management of dynamically managed code sources, permitting unauthenticated attackers to write down arbitrary recordsdata on the server, probably resulting in distant code execution.

The remaining two flaws, CVE-2025-13661 and CVE-2025-13662, relate to path traversal and improper cryptographic signature verification, respectively. Each require consumer interplay, particularly involving the import of untrusted configuration recordsdata.

CVE NumberDescriptionSeverityCVSS ScoreCVE-2025-10573Stored XSS permitting distant unauthenticated attackers to execute arbitrary JavaScript in admin classes.Critical9.6CVE-2025-13659Improper management of code sources permitting arbitrary file writing and potential RCE.High8.8CVE-2025-13662Improper verification of cryptographic signatures in patch administration permitting arbitrary code execution.High7.8CVE-2025-13661Path traversal permitting authenticated attackers to write down recordsdata exterior supposed directories.High7.1

Mitigations

Ivanti has emphasised particular mitigations for environments the place quick patching is likely to be delayed. Concerning the crucial XSS flaw (CVE-2025-10573), the corporate famous that EPM is just not supposed to be an internet-facing answer.

Organizations which have ensured their administration interface is just not uncovered to the general public web considerably cut back the chance of this vulnerability.

The invention of those vulnerabilities was credited to a number of safety researchers working by way of accountable disclosure channels.

Ivanti acknowledged the contributions of Ryan Emmons from Rapid7 for figuring out the crucial XSS flaw, Piotr Bazydlo (@chudyPB) of watchTowr for the file writing vulnerability, and researchers working with the Development Zero Day Initiative for the remaining path traversal and signature verification points.

Since no identified indicators of compromise (IoCs) at present exist, making use of the vendor-supplied patch stays the first protection.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Code, Endpoint, Execution, Manager, Patch, Vulnerabilities

Post navigation

Previous Post: Prime Security Raises $20 Million to Build Agentic Security Architect
Next Post: Threat Actors Poisoning SEO Results to Attack Organizations With Fake Microsoft Teams Installer

Related Posts

Microsoft October 2025 Patch Tuesday – 4 Zero-days and 172 Vulnerabilities Patched Microsoft October 2025 Patch Tuesday – 4 Zero-days and 172 Vulnerabilities Patched Cyber Security News
Federal Agencies Ordered to Cease Anthropic AI Use Federal Agencies Ordered to Cease Anthropic AI Use Cyber Security News
Threat Actors Advancing Email Phishing Attacks to Bypass Security Filters Threat Actors Advancing Email Phishing Attacks to Bypass Security Filters Cyber Security News
Phishing Attacks Exploit GitHub and Jira Notifications Phishing Attacks Exploit GitHub and Jira Notifications Cyber Security News
Critical InputPlumber Vulnerabilities Allows UI Input Injection and Denial-of-Service Critical InputPlumber Vulnerabilities Allows UI Input Injection and Denial-of-Service Cyber Security News
Top 5 Remote-Access And RMM Tools Most Abused By Threat Actors  Top 5 Remote-Access And RMM Tools Most Abused By Threat Actors  Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark