CVE-2025-10242

7.2 HIGH

📋 TL;DR

This vulnerability allows authenticated administrators in Ivanti EPMM to execute arbitrary operating system commands through the admin panel, leading to remote code execution. It affects organizations running vulnerable versions of Ivanti EPMM with admin users who could be compromised or malicious.

💻 Affected Systems

Products:
  • Ivanti Endpoint Manager Mobile (EPMM)
Versions: Versions before 12.6.0.2, 12.5.0.4, and 12.4.0.4
Operating Systems: All supported EPMM platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin-level authentication, but default installations include admin accounts.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full compromise of the EPMM server, allowing attacker to pivot to connected mobile devices, steal sensitive data, deploy malware, or disrupt mobile management services.

🟠

Likely Case

Attacker gains persistent access to the EPMM server, potentially compromising managed mobile devices and corporate data.

🟢

If Mitigated

Limited impact if proper network segmentation, admin account controls, and monitoring are in place to detect and block exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin credentials but command injection vulnerabilities are typically easy to weaponize once discovered.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 12.6.0.2, 12.5.0.4, or 12.4.0.4 depending on your current version

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-Endpoint-Manager-Mobile-EPMM-10-2025-Multiple-CVEs?language=en_US

Restart Required: Yes

Instructions:

1. Backup your EPMM configuration and database. 2. Download the appropriate patch from Ivanti support portal. 3. Apply the patch following Ivanti's upgrade documentation. 4. Restart the EPMM services. 5. Verify the patch was successful.

🔧 Temporary Workarounds

Restrict Admin Access

all

Limit admin panel access to specific IP addresses and require multi-factor authentication for admin accounts.

Network Segmentation

all

Isolate EPMM server from critical networks and implement strict firewall rules.

🧯 If You Can't Patch

  • Implement strict network access controls to limit EPMM admin panel access to trusted IP addresses only.
  • Enable detailed logging and monitoring for admin panel activities and command execution attempts.

🔍 How to Verify

Check if Vulnerable:

Check EPMM version in admin panel under System > About. If version is below 12.6.0.2, 12.5.0.4, or 12.4.0.4, you are vulnerable.

Check Version:

Check via EPMM web interface: System > About, or via CLI if available in your deployment.

Verify Fix Applied:

After patching, verify version shows 12.6.0.2, 12.5.0.4, or 12.4.0.4 in System > About.

📡 Detection & Monitoring

Log Indicators:

  • Unusual admin login patterns
  • Suspicious command execution in system logs
  • Multiple failed admin login attempts followed by successful login

Network Indicators:

  • Unusual outbound connections from EPMM server
  • Traffic patterns suggesting command and control activity

SIEM Query:

source="epmm" AND (event_type="admin_login" OR event_type="command_execution") AND severity=HIGH

🔗 References

📤 Share & Export