Ivanti EPMM Affected by Two Actively Exploited Zero-Day Vulnerabilities

Blog

Ivanti EPMM users must prioritize patching against critical zero-day vulnerabilities identified as CVE-2025-4427 and CVE-2025-4428. These vulnerabilities have been actively exploited in the wild, posing significant risks to organizations utilizing affected systems.

CVE-2025-4427 involves a remote code execution vulnerability that allows an attacker to execute arbitrary code on the server without prior authentication. This capability enables exploitation by external actors, facilitating unauthorized access to sensitive information.

CVE-2025-4428 is related to a privilege escalation vulnerability that can be leveraged post-exploitation, granting attackers elevated access within the system. Together, these vulnerabilities can lead to extensive data breaches and compromise organizational security.

It is imperative for organizations to apply the patches provided by Ivanti immediately to mitigate these threats. The vulnerabilities have critical CVSS scores, indicating a high level of severity that warrants urgent attention. Failure to address these vulnerabilities exposes systems to potential unauthorized access, data theft, and other malicious activities.

Organizations should ensure that all instances of Ivanti EPMM are updated to the latest versions provided by Ivanti, adhering to cybersecurity best practices. Regularly reviewing security measures and patch management processes is essential in safeguarding against evolving threats in the information security landscape.

Stay informed of such vulnerabilities and maintain robust incident response strategies to minimize risks associated with exploitation and enhance overall security posture.