Wednesday, May 14, 2025
HomeCyber Security NewsIvanti Released Security Updates to Fix for the Mutiple RCE Vulnerabilities -...

Ivanti Released Security Updates to Fix for the Mutiple RCE Vulnerabilities – Patch Now

Published on

SIEM as a Service

Follow Us on Google News

Ivanti, a leading enterprise software provider, has released critical security updates addressing vulnerabilities across several products, including Endpoint Manager Mobile (EPMM), Neurons for ITSM (on-premises), Cloud Services Application (CSA), and Neurons for MDM (N-MDM).

These vulnerabilities, ranging from medium to critical severity, could allow attackers to execute remote code, gain administrative access, escalate privileges, or edit unauthorized resources.

Ivanti urges customers to apply patches immediately to protect their environments amid a rapidly evolving threat landscape.

- Advertisement - Google News

Endpoint Manager Mobile (EPMM) Vulnerabilities

Ivanti disclosed two vulnerabilities in its on-premises EPMM product, stemming from open-source libraries:

  • CVE-2025-4427: An authentication bypass (CVSS 5.3, Medium) allowing access to protected resources without credentials.
  • CVE-2025-4428: A remote code execution (RCE) flaw (CVSS 7.2, High) enabling arbitrary code execution.

When chained, these vulnerabilities could lead to unauthenticated RCE. According to Ivanti, a “very limited number” of customers have been exploited.

Affected versions include 11.12.0.4, 12.3.0.1, 12.4.0.1, 12.5.0.0, and prior. Customers can mitigate risks by filtering API access using Portal ACLs or an external Web Application Firewall (WAF).

An RPM file is also available for supported versions (12.3, 12.4, 12.5) via a support case. These issues do not affect Ivanti’s cloud-based Neurons for MDM, Sentry, or other products.

Neurons for ITSM (On-Premises) Vulnerability

A critical vulnerability, CVE-2025-22462 (CVSS 9.8, Critical; Environmental Score 6.9, Medium), affects Ivanti Neurons for ITSM (on-premises) versions 2023.4, 2024.2, and 2024.3.

This authentication bypass could allow an unauthenticated remote attacker to gain administrative access, depending on system configuration. No known exploits have been reported.

Patches for May 2025 are available via Ivanti’s download portal (ILS). Customers can reduce risk by securing the IIS website, restricting access to specific IP addresses and domains, or configuring the solution with a DMZ for external users.

Cloud Services Application (CSA) Vulnerability

The Ivanti Cloud Services Application (CSA) is impacted by CVE-2025-22460 (CVSS 7.8, High), a default credentials vulnerability in versions 5.0.4 and prior. This flaw allows a local authenticated attacker to escalate privileges.

No exploits have been reported. Customers should upgrade to CSA 5.0.5, but Ivanti warns that upgrading from 5.0.4 does not automatically apply the fix.

A fresh installation or manual mitigation steps are required, with a future release planned to address this issue. The update is available at Ivanti’s download portal.

Neurons for MDM (N-MDM) Vulnerability

An improper authorization vulnerability (CVSS 5.4, Medium) in Ivanti Neurons for MDM (N-MDM) version R110 allows unauthenticated remote attackers to edit or delete unauthorized resources.

No CVE was assigned, as the issue did not meet CVE criteria, but Ivanti disclosed it for transparency.

The fix was automatically applied to all cloud environments and version R114 is unaffected. No exploits have been reported.

Ivanti urges customers to apply patches immediately and review configurations to minimize risks.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Chinese Hackers Exploit SAP NetWeaver Zero-Day Vulnerability to Target Critical Infrastructure

EclecticIQ analysts have uncovered a sophisticated cyber-espionage campaign orchestrated by China-nexus nation-state Advanced Persistent...

Researchers Unveil New Threat-Hunting Techniques to Detect Azure Managed Identity Abuse

A group of cybersecurity specialists from Hunters, working under the prestigious Team Axon, have...

Windows CLFS Zero-Day Vulnerability Actively Exploited in the Wild

Microsoft has disclosed two critical security vulnerabilities in the Windows Common Log File System...

Critical Samsung MagicINFO 9 Server Flaw Allows Arbitrary File Writes

Samsung’s SmartTV and digital signage ecosystem faces renewed cybersecurity scrutiny following the disclosure of...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Chinese Hackers Exploit SAP NetWeaver Zero-Day Vulnerability to Target Critical Infrastructure

EclecticIQ analysts have uncovered a sophisticated cyber-espionage campaign orchestrated by China-nexus nation-state Advanced Persistent...

Researchers Unveil New Threat-Hunting Techniques to Detect Azure Managed Identity Abuse

A group of cybersecurity specialists from Hunters, working under the prestigious Team Axon, have...

Windows CLFS Zero-Day Vulnerability Actively Exploited in the Wild

Microsoft has disclosed two critical security vulnerabilities in the Windows Common Log File System...
OSZAR »