CVE-2025-62384

6.5 MEDIUM

📋 TL;DR

This SQL injection vulnerability in Ivanti Endpoint Manager allows authenticated attackers to read arbitrary database data. Organizations using Ivanti EPM versions before 2024 SU5 are affected. Attackers must have valid credentials to exploit this vulnerability.

💻 Affected Systems

Products:
  • Ivanti Endpoint Manager
Versions: All versions before 2024 SU5
Operating Systems: Windows Server, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable. Requires authenticated access to the EPM web interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including sensitive configuration data, credentials, and endpoint information leading to lateral movement and privilege escalation.

🟠

Likely Case

Unauthorized access to sensitive endpoint management data, configuration details, and potentially credential harvesting.

🟢

If Mitigated

Limited data exposure due to proper input validation and database permissions restricting accessible tables.

🌐 Internet-Facing: MEDIUM - Requires authentication but internet-facing instances could be targeted by credential stuffing or phishing attacks.
🏢 Internal Only: HIGH - Internal attackers with valid credentials can exploit this to gain unauthorized database access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access and SQL injection knowledge. No public exploit code available as of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024 SU5 or later

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-EPM-October-2025

Restart Required: No

Instructions:

1. Download Ivanti Endpoint Manager 2024 SU5 or later from Ivanti portal. 2. Backup current configuration. 3. Apply the update following Ivanti's upgrade documentation. 4. Verify successful installation.

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement additional input validation for database queries in custom integrations

Database Permission Restriction

all

Apply principle of least privilege to database user accounts used by EPM

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate EPM servers from untrusted networks
  • Enforce strong authentication policies and monitor for suspicious authentication attempts

🔍 How to Verify

Check if Vulnerable:

Check Ivanti EPM version in Administration Console under Help > About

Check Version:

Not applicable - check via web interface or Ivanti management console

Verify Fix Applied:

Confirm version is 2024 SU5 or later and test SQL injection payloads return errors instead of data

📡 Detection & Monitoring

Log Indicators:

  • Unusual database query patterns
  • Multiple failed SQL syntax attempts followed by successful complex queries
  • Authentication logs showing unusual user behavior

Network Indicators:

  • Unusual SQL query patterns in database traffic
  • HTTP requests containing SQL keywords to EPM endpoints

SIEM Query:

source="epm_logs" AND (message="*sql*" OR message="*select*" OR message="*union*") AND NOT message="*normal*"

🔗 References

📤 Share & Export