CVE-2025-62387

6.5 MEDIUM

📋 TL;DR

This SQL injection vulnerability in Ivanti Endpoint Manager allows authenticated attackers to read arbitrary data from the database. Organizations using Ivanti EPM versions before 2024 SU5 are affected. The attacker must have valid credentials to exploit this vulnerability.

💻 Affected Systems

Products:
  • Ivanti Endpoint Manager
Versions: All versions before 2024 SU5
Operating Systems: Windows Server, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability affects the default installation configuration. Authentication is required to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could exfiltrate sensitive data including credentials, configuration details, and endpoint information, potentially leading to lateral movement and full system compromise.

🟠

Likely Case

Attackers with legitimate access could read sensitive database information, potentially exposing credentials, system configurations, or other protected data.

🟢

If Mitigated

With proper input validation and parameterized queries, the vulnerability would be prevented, limiting database access to authorized queries only.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access. SQL injection techniques are well-documented and tools like sqlmap could potentially exploit this.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024 SU5 or later

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-EPM-October-2025

Restart Required: No

Instructions:

1. Download Ivanti Endpoint Manager 2024 SU5 or later from the Ivanti portal. 2. Follow the standard upgrade procedure outlined in Ivanti documentation. 3. Verify the upgrade completed successfully.

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement additional input validation on all user-supplied parameters that interact with the database

Database Access Restriction

all

Apply principle of least privilege to database accounts used by Ivanti EPM

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to Ivanti EPM servers
  • Enable detailed SQL query logging and monitor for suspicious database activity

🔍 How to Verify

Check if Vulnerable:

Check the Ivanti EPM version in the administration console or via the web interface

Check Version:

Check the version in Ivanti EPM web interface under Help > About

Verify Fix Applied:

Verify the version shows 2024 SU5 or later after applying the patch

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL query patterns in database logs
  • Multiple failed login attempts followed by successful authentication
  • Unusual data access patterns from authenticated users

Network Indicators:

  • Unusual database query traffic from Ivanti EPM servers
  • Large data transfers from database to unexpected destinations

SIEM Query:

source="database_logs" AND (query CONTAINS "UNION" OR query CONTAINS "SELECT *" OR query CONTAINS "INFORMATION_SCHEMA")

🔗 References

📤 Share & Export