
[CIVN-2025-0367] Multiple vulnerabilities in Ivanti Endpoint Manager
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple vulnerabilities in Ivanti Endpoint Manager
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
Ivanti Endpoint Manager 2024 SU4 and prior
Overview
Multiple vulnerabilities have been reported in Ivanti Endpoint Manager, which could allow an attacker to perform remote code execution on the targeted system.
Target Audience:
All end-user organizations and individuals using affected Ivanti Endpoint Manager.
Risk Assessment:
High risk of unauthorized access, compromise of administrative sessions, manipulation of application files, and potential system compromise.
Impact Assessment:
Potential unauthorized access to sensitive information, modification of application resources, execution of malicious code under certain conditions, and compromise of system security.
Description
Ivanti Endpoint Manager (EPM) is a Unified Endpoint Management (UEM) solution that centralizes the management, security, and asset tracking of all devices, including Windows, macOS, Linux, iOS, and Android endpoints for efficient IT operations, security posture improvement, and compliance across the entire organization.
Multiple vulnerabilities have been reported in Ivanti Endpoint Manager, Ivanti Endpoint Manager due to Stored XSS, Improper control of dynamically managed code resources, Path traversal, Improper verification of cryptographic signatures in the patch management component respectively.
Successful exploitation of these vulnerabilities could allow an attacker to perform remote code execution on the targeted system.
Solution
Apply appropriate updates as mentioned by the vendor
Vendor Information
Ivanti
https://forums.ivanti.com/s/article/Security-Advisory-EPM-December-2025-for-EPM-2024?language=en_US
References
Ivanti
https://forums.ivanti.com/s/article/Security-Advisory-EPM-December-2025-for-EPM-2024?language=en_US
CVE Name
CVE-2025-10573
CVE-2025-13659
CVE-2025-13661
CVE-2025-13662
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=7Q3l
—–END PGP SIGNATURE—–


