CVE-2025-62385

6.5 MEDIUM

📋 TL;DR

This SQL injection vulnerability in Ivanti Endpoint Manager allows authenticated attackers to read arbitrary database data. Organizations using Ivanti EPM versions before 2024 SU5 are affected. The attacker must have valid credentials to exploit this vulnerability.

💻 Affected Systems

Products:
  • Ivanti Endpoint Manager
Versions: All versions before 2024 SU5
Operating Systems: Windows Server, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The attacker must have authenticated access to the EPM interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including sensitive configuration data, credentials, and endpoint information leading to lateral movement across the network.

🟠

Likely Case

Data exfiltration of endpoint management data, potentially exposing system configurations and asset information.

🟢

If Mitigated

Limited data exposure due to proper input validation and database permissions restricting access to sensitive tables.

🌐 Internet-Facing: MEDIUM - While authentication is required, exposed management interfaces could be targeted by credential stuffing or compromised accounts.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts can exploit this to gain unauthorized database access and potentially pivot to other systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access and SQL injection knowledge. No public exploit code available as of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024 SU5 or later

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-EPM-October-2025

Restart Required: No

Instructions:

1. Download Ivanti Endpoint Manager 2024 SU5 or later from Ivanti portal. 2. Backup current configuration and database. 3. Run the installer with administrative privileges. 4. Follow upgrade wizard prompts. 5. Verify successful upgrade in EPM console.

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement additional input validation at web application layer to sanitize SQL queries

Database Permission Restriction

all

Apply principle of least privilege to database user accounts used by EPM

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to EPM management interface to authorized users only
  • Enable detailed SQL query logging and monitor for unusual database access patterns

🔍 How to Verify

Check if Vulnerable:

Check Ivanti EPM version in Administration > About. If version is earlier than 2024 SU5, system is vulnerable.

Check Version:

In EPM console: Navigate to Administration > About to view version

Verify Fix Applied:

Verify version shows 2024 SU5 or later in Administration > About. Test SQL injection attempts should be blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL query patterns in database logs
  • Multiple failed login attempts followed by successful authentication
  • Unexpected database read operations from EPM application user

Network Indicators:

  • Unusual database connection patterns from EPM server
  • Large data transfers from database to EPM application

SIEM Query:

source="epm_logs" AND (event="sql_error" OR event="database_query") AND query CONTAINS "UNION" OR query CONTAINS "SELECT * FROM"

🔗 References

📤 Share & Export