Ivanti Discloses 13 Vulnerabilities in Endpoint Manager, Two High-Severity

Ivanti Publishes Advisory for 13 Vulnerabilities in Endpoint Manager (EPM), Including High-Severity RCE and Privilege Escalation Flaws

HIGH
October 13, 2025
4m read
VulnerabilityPatch Management

Related Entities

Organizations

Products & Tech

Ivanti Endpoint Manager (EPM)

CVE Identifiers

CVE-2025-62389
MEDIUM
CVE-2025-11622
MEDIUM
CVE-2025-9713
MEDIUM

Full Report

Executive Summary

Ivanti has disclosed 13 new vulnerabilities in its Endpoint Manager (EPM) software, a widely used solution for enterprise IT management. The advisory details two high-severity and eleven medium-severity flaws. The most serious of these could allow a local attacker to escalate privileges or a remote attacker to achieve code execution. At the time of disclosure, there was no evidence of these vulnerabilities being exploited in the wild. However, given Ivanti products' history as a target for threat actors, customers are strongly advised to review the advisory and plan for patching and upgrades. Patches for some of the flaws are scheduled for release in November 2025.


Vulnerability Details

The advisory covers a range of vulnerability types, with the two high-severity flaws posing the most immediate risk.

High-Severity Vulnerabilities

  1. Insecure Deserialization (Privilege Escalation): A flaw that can be exploited by an authenticated local attacker to execute arbitrary code with higher privileges on the EPM server.
  2. Path Traversal (Remote Code Execution): A vulnerability that allows a remote, unauthenticated attacker to achieve RCE. However, this flaw requires some form of user interaction, making it slightly more difficult to exploit than a zero-click vulnerability.

Medium-Severity Vulnerabilities

  • SQL Injection: The bulk of the medium-severity flaws are SQL injection vulnerabilities, such as CVE-2025-62389. These could allow a remote, authenticated attacker to read arbitrary data from the EPM database, potentially exposing sensitive configuration details, credentials, or information about managed endpoints. Other tracked SQL injection flaws include CVE-2025-11622 and CVE-2025-9713.

Affected Systems

  • Product: Ivanti Endpoint Manager (EPM)
  • Affected Versions: The advisory applies to multiple versions of EPM, with a specific note that EPM 2022 reached its end-of-life (EOL) in October 2025. Organizations still using this version are at increased risk as it will no longer receive security updates.

Exploitation Status

As of October 13, 2025, Ivanti is not aware of any active exploitation of these 13 vulnerabilities. However, products from Ivanti, particularly its remote access and management solutions, have been a frequent target for both nation-state and cybercrime actors in the past. Therefore, the potential for future exploitation is high.


Impact Assessment

Successful exploitation of these vulnerabilities could lead to significant security incidents.

  • Privilege Escalation: An attacker with low-level access to an EPM server could use the deserialization flaw to gain SYSTEM-level privileges, taking full control of the server.
  • Remote Code Execution: The path traversal flaw could allow an attacker to gain an initial foothold on the EPM server, which can then be used to pivot into the broader corporate network.
  • Data Breach: The multiple SQL injection flaws could lead to the exfiltration of the entire EPM database, exposing sensitive data about the IT environment and all managed devices.

Since EPM is used to manage and deploy software to countless endpoints, a compromise of the EPM server itself is a critical security event that could lead to a widespread supply chain-style attack within an organization.


Detection Methods

  • Vulnerability Scanning: Use a vulnerability scanner with updated plugins for Ivanti products to identify affected EPM servers in your environment.
  • Log Analysis: Monitor web and application logs on EPM servers for signs of exploitation attempts, such as unusual path traversal sequences (../) in requests or SQL injection syntax (' OR 1=1 --).
  • Endpoint Monitoring: Use EDR to monitor the EPM server for suspicious process activity or file modifications that could indicate a successful compromise.

Remediation Steps

  1. Upgrade to EPM 2024: Ivanti's primary recommendation is for all customers to upgrade to EPM version 2024. This version contains security enhancements that mitigate the risk of these vulnerabilities.
  2. Apply Patches: Patches for the SQL injection flaws CVE-2025-11622 and CVE-2025-9713 are scheduled for release in the 2024 SU4 version, expected around November 12, 2025. Customers should plan to apply this update as soon as it becomes available. This is a direct application of Software Update (D3-SU).
  3. Implement Mitigations: Until all patches are available, review and apply any temporary mitigations suggested by Ivanti in the security advisory.
  4. Decommission EOL Systems: Immediately plan the decommissioning or upgrade of any EPM 2022 instances, as they are no longer supported and represent a significant security risk.

Timeline of Events

1
October 13, 2025
Ivanti publishes a security advisory detailing 13 new vulnerabilities in Endpoint Manager.
2
October 13, 2025
This article was published
3
November 12, 2025
Targeted release date for version 2024 SU4, which will patch some of the disclosed SQL injection vulnerabilities.

MITRE ATT&CK Mitigations

Upgrading to a supported version and applying all security patches is the primary remediation.

Restricting access to the EPM management interface from the internet can reduce the attack surface for remote vulnerabilities.

Isolating the EPM server in a segmented network can limit the impact of a potential compromise.

D3FEND Defensive Countermeasures

The most critical action for Ivanti customers is to adhere to a strict software update and lifecycle management process. Specifically, organizations must prioritize upgrading all Ivanti Endpoint Manager (EPM) instances from the now end-of-life 2022 version to the supported EPM 2024 release. This upgrade addresses the underlying security weaknesses that gave rise to these vulnerabilities. Following the upgrade, a plan must be in place to promptly apply the 2024 SU4 patch, expected around November 12, 2025, to fix the specific SQL injection flaws. Proactive patch and version management is the only definitive way to remediate these and future vulnerabilities in high-value targets like Ivanti EPM.

Sources & References

Security Advisory Ivanti Endpoint Manager (EPM) October 2025
Ivanti (forums.ivanti.com) October 13, 2025
CVE-2025-62389 Detail
NIST NVD (nvd.nist.gov) October 13, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

IvantiVulnerabilityPatch ManagementEPMRCESQL InjectionPrivilege Escalation

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading