Ivanti EPMM Addresses Vulnerabilities CVE-2025-4427 and CVE-2025-4428

Published:

spot_img

Ivanti Security Advisory: Critical Vulnerabilities in Endpoint Manager Mobile (EPMM) Addressed


This heading succinctly captures the essence of the content, highlighting the focus on security vulnerabilities and the specific software affected.

Ivanti Issues Urgent Security Patches for Endpoint Manager Mobile Vulnerabilities

In a critical move to safeguard enterprise systems, Ivanti has released security patches addressing two significant vulnerabilities in its Endpoint Manager Mobile (EPMM) software. Identified as CVE-2025-4427 and CVE-2025-4428, these flaws have been actively exploited in limited attacks, raising alarms among organizations relying on the software.

CVE-2025-4427, with a CVSS score of 5.3, allows attackers to bypass authentication mechanisms, granting unauthorized access to protected resources. More alarmingly, CVE-2025-4428, rated at a severe 7.2, enables remote code execution, potentially allowing attackers to take full control of affected systems.

When exploited together, these vulnerabilities pose a grave risk, as they enable attackers to execute arbitrary code without authentication. Ivanti’s May 2025 advisory highlighted the urgency of these issues, noting that a limited number of cases had already been reported.

The vulnerabilities affect several versions of EPMM, specifically versions 11.12.0.4 and earlier, along with all 12.3.0.1, 12.4.0.1, and 12.5.0.0 versions. Organizations are strongly urged to upgrade to the patched versions—11.12.0.5, 12.3.0.2, 12.4.0.2, and 12.5.0.1—to mitigate the risks.

For those unable to upgrade immediately, Ivanti recommends implementing security measures such as filtering API access using built-in Portal ACLs or deploying an external Web Application Firewall (WAF). However, these measures may have limitations, particularly in dynamic environments.

As cyber threats continue to evolve, organizations must remain vigilant, promptly applying security patches and adhering to best practices to protect their systems from potential exploitation.

spot_img

Related articles

Recent articles

Irish Food and Drink Exports to the Middle East and Africa Reach $624 Million in 2024

Ireland’s Food and Drink Exports Flourish in MENA In 2024, Ireland's exports of food and drink to the Middle East and North Africa (MENA) region...

Why Traditional DLP Solutions Struggle in the Browser Era

Jun 04, 2025The Hacker NewsBrowser Security / Enterprise Security As businesses increasingly embrace Software as a Service (SaaS) platforms such as Google Workspace, Salesforce, and...

Reolink Introduces Innovative Security Solutions in the Middle East

Strengthening Cybersecurity: Help AG’s New Partnership with F5 In an era where digital transformation is rapidly reshaping the landscape of business, cybersecurity remains a paramount...

Police Shut Down Dark Web Shop Pygmalion, Compromise Data from 7,000 Orders

Major Disruption: German Police Seize Dark Web Drug Marketplace “Pygmalion” German authorities have successfully disrupted a significant dark web operation known as "Pygmalion," resulting in...