[CIVN-2025-0254] Remote code execution Vulnerabilities in Ivanti Endpoint Manager
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Remote code execution Vulnerabilities in Ivanti Endpoint Manager
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
Ivanti Endpoint Manager 2022 SU8 Security Update 1 and prior
Ivanti Endpoint Manager 2024 SU3 and prior
Overview
Multiple vulnerabilities have been reported in Ivanti Endpoint Manager that could allow a remote attacker to execute arbitrary code on the targeted system.
Target Audience:
Individuals and end-user organizations using affected Ivanti Endpoint Manager.
Risk Assessment:
High risk of sensitive data disclosure and process disruptions.
Impact Assessment:
Potential for system compromise and service disruptions.
Description
Ivanti Endpoint Manager (EPM) is a Unified Endpoint Management (UEM) solution used to securely manage and monitor devices across platforms, including Windows, macOS, Linux, and mobile environments.
These vulnerabilities exist in Ivanti Endpoint Manager due to insufficient validation of filenames during file-handling operations. A remote, unauthenticated attacker could exploit these flaws by supplying a specially crafted filename that triggers arbitrary code execution when processed by the affected component.
Successful exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code on the targeted system.
Solution
Apply appropriate updates as mentioned by the vendor:
https://forums.ivanti.com/s/article/Security-Advisory-September-2025-for-Ivanti-EPM-2024-SU3-and-EPM-2022-SU8?language=en_US
Vendor Information
Ivanti
https://forums.ivanti.com/s/article/Security-Advisory-September-2025-for-Ivanti-EPM-2024-SU3-and-EPM-2022-SU8?language=en_US
References
Ivanti
https://forums.ivanti.com/s/article/Security-Advisory-September-2025-for-Ivanti-EPM-2024-SU3-and-EPM-2022-SU8?language=en_US
CVE Name
CVE-2025-9712
CVE-2025-9872
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=goa0
—–END PGP SIGNATURE—–