CVE-2025-10985

7.2 HIGH

📋 TL;DR

This CVE describes an OS command injection vulnerability in Ivanti EPMM admin panel that allows authenticated administrators to execute arbitrary commands on the underlying system. Attackers with admin credentials can achieve remote code execution, potentially compromising the entire EPMM deployment and connected mobile devices.

💻 Affected Systems

Products:
  • Ivanti Endpoint Manager Mobile (EPMM)
Versions: All versions before 12.6.0.2, 12.5.0.4, and 12.4.0.4
Operating Systems: Linux-based EPMM appliance
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin-level authentication to exploit. EPMM deployments with internet-facing admin interfaces are at highest risk.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the EPMM server leading to lateral movement to connected mobile devices, data exfiltration, and persistent backdoor installation across the mobile device fleet.

🟠

Likely Case

Attacker gains full control of EPMM server, can deploy malicious configurations to managed mobile devices, and access sensitive organizational data stored in EPMM.

🟢

If Mitigated

Limited impact due to network segmentation, strong authentication controls, and admin activity monitoring preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin credentials but command injection vulnerabilities are typically straightforward to weaponize once discovered.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 12.6.0.2, 12.5.0.4, or 12.4.0.4 depending on your current version

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-Endpoint-Manager-Mobile-EPMM-10-2025-Multiple-CVEs?language=en_US

Restart Required: Yes

Instructions:

1. Backup EPMM configuration and database. 2. Download appropriate patch version from Ivanti support portal. 3. Apply patch via EPMM admin interface. 4. Restart EPMM services. 5. Verify successful update in admin panel.

🔧 Temporary Workarounds

Restrict Admin Panel Access

all

Limit EPMM admin interface access to trusted IP addresses only

Configure firewall rules to restrict access to EPMM admin port (typically 8443) from authorized management networks only

Implement Multi-Factor Authentication

all

Require MFA for all EPMM admin accounts

Configure EPMM to require MFA for admin login via Settings > Authentication > Multi-Factor Authentication

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate EPMM server from critical systems
  • Enable detailed logging and monitoring of all admin panel activities and command execution

🔍 How to Verify

Check if Vulnerable:

Check EPMM version in admin panel under Settings > About. If version is below 12.6.0.2, 12.5.0.4, or 12.4.0.4, system is vulnerable.

Check Version:

Login to EPMM admin panel and navigate to Settings > About to view version

Verify Fix Applied:

After patching, verify version shows 12.6.0.2, 12.5.0.4, or 12.4.0.4 in admin panel. Test admin functionality remains operational.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns in EPMM logs
  • Multiple failed admin login attempts followed by successful login
  • Unexpected system commands executed from EPMM processes

Network Indicators:

  • Unusual outbound connections from EPMM server
  • Traffic to unexpected ports from EPMM admin interface

SIEM Query:

source="epmm" AND (event_type="command_execution" OR event_type="admin_login") | stats count by user, command

🔗 References

📤 Share & Export