CVE-2025-62386

6.5 MEDIUM

📋 TL;DR

This SQL injection vulnerability in Ivanti Endpoint Manager allows authenticated attackers to read arbitrary data from the database. Organizations using Ivanti EPM versions before 2024 SU5 are affected, potentially exposing sensitive configuration and endpoint data.

💻 Affected Systems

Products:
  • Ivanti Endpoint Manager
Versions: All versions before 2024 SU5
Operating Systems: Windows Server, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments with default configurations. Requires authenticated access to the management interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including credentials, configuration secrets, and sensitive endpoint data leading to lateral movement and privilege escalation.

🟠

Likely Case

Unauthorized access to endpoint management data, configuration details, and potentially credential harvesting for further attacks.

🟢

If Mitigated

Limited data exposure with proper network segmentation and minimal sensitive data in affected tables.

🌐 Internet-Facing: MEDIUM - Requires authentication but could be exploited if management interface is exposed to internet.
🏢 Internal Only: HIGH - Authenticated users or compromised accounts can exploit this from internal networks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access and SQL injection knowledge. No public exploit available as of advisory publication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024 SU5 or later

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-EPM-October-2025

Restart Required: No

Instructions:

1. Download Ivanti Endpoint Manager 2024 SU5 or later from Ivanti portal. 2. Backup current configuration and database. 3. Apply the update following Ivanti's upgrade documentation. 4. Verify successful update and functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to Ivanti EPM management interface to authorized administrators only.

Principle of Least Privilege

all

Review and minimize user accounts with administrative access to Ivanti EPM.

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the Ivanti EPM management interface
  • Enable detailed logging and monitoring for SQL injection attempts and unusual database queries

🔍 How to Verify

Check if Vulnerable:

Check Ivanti EPM version in administration console or via 'ivanti-version' command in installation directory.

Check Version:

Navigate to Ivanti EPM installation directory and run: .\ivanti-version.exe (Windows) or ./ivanti-version (Linux)

Verify Fix Applied:

Confirm version is 2024 SU5 or later and test management functionality remains operational.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL query patterns in database logs
  • Multiple failed authentication attempts followed by successful login
  • Unexpected database read operations from EPM application

Network Indicators:

  • Unusual outbound database connections from EPM server
  • SQL injection patterns in HTTP requests to EPM management interface

SIEM Query:

source="epm_logs" AND ("sql" OR "database") AND ("error" OR "unexpected" OR "malformed")

🔗 References

📤 Share & Export