Ivanti has disclosed 13 new vulnerabilities in its Endpoint Manager (EPM) software, a widely used solution for enterprise IT management. The advisory details two high-severity and eleven medium-severity flaws. The most serious of these could allow a local attacker to escalate privileges or a remote attacker to achieve code execution. At the time of disclosure, there was no evidence of these vulnerabilities being exploited in the wild. However, given Ivanti products' history as a target for threat actors, customers are strongly advised to review the advisory and plan for patching and upgrades. Patches for some of the flaws are scheduled for release in November 2025.
The advisory covers a range of vulnerability types, with the two high-severity flaws posing the most immediate risk.
CVE-2025-62389. These could allow a remote, authenticated attacker to read arbitrary data from the EPM database, potentially exposing sensitive configuration details, credentials, or information about managed endpoints. Other tracked SQL injection flaws include CVE-2025-11622 and CVE-2025-9713.As of October 13, 2025, Ivanti is not aware of any active exploitation of these 13 vulnerabilities. However, products from Ivanti, particularly its remote access and management solutions, have been a frequent target for both nation-state and cybercrime actors in the past. Therefore, the potential for future exploitation is high.
Successful exploitation of these vulnerabilities could lead to significant security incidents.
Since EPM is used to manage and deploy software to countless endpoints, a compromise of the EPM server itself is a critical security event that could lead to a widespread supply chain-style attack within an organization.
../) in requests or SQL injection syntax (' OR 1=1 --).CVE-2025-11622 and CVE-2025-9713 are scheduled for release in the 2024 SU4 version, expected around November 12, 2025. Customers should plan to apply this update as soon as it becomes available. This is a direct application of Software Update (D3-SU).Upgrading to a supported version and applying all security patches is the primary remediation.
Restricting access to the EPM management interface from the internet can reduce the attack surface for remote vulnerabilities.
Isolating the EPM server in a segmented network can limit the impact of a potential compromise.
The most critical action for Ivanti customers is to adhere to a strict software update and lifecycle management process. Specifically, organizations must prioritize upgrading all Ivanti Endpoint Manager (EPM) instances from the now end-of-life 2022 version to the supported EPM 2024 release. This upgrade addresses the underlying security weaknesses that gave rise to these vulnerabilities. Following the upgrade, a plan must be in place to promptly apply the 2024 SU4 patch, expected around November 12, 2025, to fix the specific SQL injection flaws. Proactive patch and version management is the only definitive way to remediate these and future vulnerabilities in high-value targets like Ivanti EPM.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats