CVE-2025-62383

6.5 MEDIUM

📋 TL;DR

This SQL injection vulnerability in Ivanti Endpoint Manager allows authenticated attackers to read arbitrary database data. Organizations using Ivanti EPM versions before 2024 SU5 are affected, potentially exposing sensitive information stored in the database.

💻 Affected Systems

Products:
  • Ivanti Endpoint Manager
Versions: All versions before 2024 SU5
Operating Systems: Windows Server, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the EPM interface. Database backend may vary (SQL Server, Oracle, etc.).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including credentials, configuration data, and sensitive organizational information leading to data breach and lateral movement.

🟠

Likely Case

Unauthorized access to sensitive data stored in the EPM database, potentially including endpoint information, user data, and system configurations.

🟢

If Mitigated

Limited data exposure due to proper input validation and database permissions, with only non-sensitive data accessible.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access to the EPM web interface. SQL injection techniques can be used to extract database information.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024 SU5 or later

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-EPM-October-2025

Restart Required: No

Instructions:

1. Download Ivanti Endpoint Manager 2024 SU5 or later from the Ivanti portal. 2. Follow standard Ivanti EPM upgrade procedures. 3. Verify successful installation and functionality.

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement additional input validation on affected endpoints to filter SQL injection attempts

Database Permission Restriction

all

Limit database user permissions to minimum required access for EPM application

🧯 If You Can't Patch

  • Implement web application firewall (WAF) with SQL injection rules
  • Restrict network access to EPM interface to authorized users only

🔍 How to Verify

Check if Vulnerable:

Check Ivanti EPM version in administration console. If version is earlier than 2024 SU5, system is vulnerable.

Check Version:

Check Ivanti EPM console → Help → About or use Ivanti EPM command line tools

Verify Fix Applied:

Confirm version shows 2024 SU5 or later in administration console and test SQL injection attempts are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual database queries from EPM application
  • Multiple failed SQL query attempts
  • Suspicious parameter values in web logs

Network Indicators:

  • SQL error messages in HTTP responses
  • Unusual database connection patterns from EPM server

SIEM Query:

source="epm_logs" AND ("sql" OR "database" OR "query") AND ("error" OR "exception" OR "injection")

🔗 References

📤 Share & Export