CISA Investigates Ivanti EPMM Malware Intrusions

Published:

spot_img

CISA Issues Warning on Vulnerabilities in Ivanti Endpoint Manager Mobile

The Cybersecurity and Infrastructure Security Agency (CISA) has recently provided critical technical information regarding malware associated with significant vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM). These weaknesses have raised alarms among cybersecurity experts after being exploited in various attacks.

Overview of the Vulnerabilities

The identified vulnerabilities, specifically CVE-2025-4427 and CVE-2025-4428, were disclosed on May 13. These flaws received CVSS scores of 5.3 and 7.2, respectively, indicating a moderate to high level of severity. Following their discovery, instances of exploitation increased, particularly after proof-of-concept (PoC) exploit code became publicly available. By late May, a China-linked threat actor known as UNC5221 was reported to be utilizing these vulnerabilities for malicious purposes.

Nature of the Security Flaws

The security flaws consist of an authentication bypass and a remote code execution (RCE) vulnerability, both found within open-source libraries integrated into the Ivanti EPMM. These vulnerabilities can be exploited in tandem, creating a pathway for unauthenticated remote code execution. This means that attackers could potentially take control of systems running the compromised software without needing valid authentication.

Malware Deployment and Capabilities

CISA has detailed the findings related to two specific sets of malware linked to the exploitation of EPMM. These malware sets consist of a total of five files discovered on networks that had become compromised. Using the vulnerabilities, attackers managed to gain access to the EPMM server, allowing them to execute remote commands. This enabled a range of malicious activities such as gathering system information, listing root directories, deploying harmful files, conducting network reconnaissance, executing scripts, and dumping LDAP credentials.

Both sets of malware were designed to ensure persistence on the compromised systems by enabling the threat actors to inject and execute arbitrary code. CISA points out that the malware was deployed in segments, specifically organized to avoid detection by signature-based security systems and to work around size limitations.

Technical Details of the Malware

The first set of malware included a manager component that manipulated Java objects to inject a malicious listener within the Apache Tomcat server running in conjunction with EPMM. This listener was capable of intercepting specific HTTP requests, processing them, and decoding payloads to dynamically build and execute new classes.

Similarly, the second malware set also featured a malicious listener capable of retrieving and decrypting password parameters from targeted HTTP requests. This component was responsible for defining and loading new malicious classes, encoding the output, and generating responses based on the results.

In response to these alarming developments, CISA strongly advises organizations that utilize Ivanti EPMM to update to patched versions without delay. The recommended updates are versions 11.12.0.5, 12.3.0.2, 12.4.0.2, and 12.5.0.1 and any newer releases that address the vulnerabilities.

Furthermore, CISA underscores the importance of implementing additional restrictions and monitoring for mobile device management (MDM) systems. Organizations should consistently follow robust cybersecurity best practices to bolster their defenses against similar threats.

Conclusion

As more details emerge about the exploitation of these vulnerabilities, it’s crucial for organizations to act swiftly to protect their networks and data. Regular updates and vigilant monitoring of cybersecurity practices are essential in today’s rapidly evolving threat landscape. Organizations must remain proactive to mitigate risks and defend against potential cyber threats.

spot_img

Related articles

Recent articles

Urgent: Command Injection Flaw Actively Exploited in Array AG Gateways

Security Alert: Command Injection Vulnerability in Array Networks AG Series Overview of the Vulnerability The Japan Computer Emergency Response Team Coordination Center (JPCERT/CC) has issued a...

ED Seizes ₹1,120 Crore in Reliance Home Finance Case Over Alleged Fund Diversion

Major Enforcement Action Against Reliance Anil Dhirubhai Ambani Group Enforcement Directorate Steps In The Enforcement Directorate (ED) has intensified its efforts in addressing alleged financial irregularities...

Lee County Man Arrested for Dark Web Drug Purchases Following Package Discovery

Lee County Man Arrested for Dark Web Drug Purchases Discovery of a Drug-Filled Package In a significant operation, Lee County deputies apprehended a man after he...

CISA Alerts: PRC Hackers Target VMware vSphere with BRICKSTORM Malware

U.S. and Canadian cybersecurity agencies have issued a critical alert regarding a sophisticated malware known as BRICKSTORM. Linked to China-sponsored...