CVE-2025-62388

6.5 MEDIUM

📋 TL;DR

This SQL injection vulnerability in Ivanti Endpoint Manager allows authenticated attackers to read arbitrary database data. Organizations using Ivanti EPM versions before 2024 SU5 are affected. The vulnerability requires authentication but could lead to sensitive information disclosure.

💻 Affected Systems

Products:
  • Ivanti Endpoint Manager
Versions: All versions before 2024 SU5
Operating Systems: Windows Server, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. Requires authenticated access to the EPM interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including credentials, sensitive configuration data, and potentially lateral movement to other systems.

🟠

Likely Case

Unauthorized access to sensitive endpoint management data, user information, and system configurations.

🟢

If Mitigated

Limited data exposure if proper input validation and database permissions are enforced.

🌐 Internet-Facing: MEDIUM - Requires authentication but could be exploited if exposed to internet with valid credentials.
🏢 Internal Only: HIGH - Internal attackers with valid credentials can exploit this to access sensitive data.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access and SQL injection knowledge. No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024 SU5 or later

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-EPM-October-2025

Restart Required: No

Instructions:

1. Download Ivanti EPM 2024 SU5 or later from Ivanti portal. 2. Backup current configuration. 3. Apply the update following Ivanti's upgrade documentation. 4. Verify successful update.

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement additional input validation on all database queries

Not applicable - requires code changes

Database Permission Restriction

database

Restrict database user permissions to minimum required

ALTER USER epm_user WITH NOSUPERUSER;
REVOKE ALL ON DATABASE epmdb FROM public;

🧯 If You Can't Patch

  • Implement strict network segmentation to limit access to EPM servers
  • Enforce principle of least privilege for all EPM user accounts

🔍 How to Verify

Check if Vulnerable:

Check Ivanti EPM version in administration console or via 'ivanti-epm --version' command

Check Version:

ivanti-epm --version

Verify Fix Applied:

Verify version is 2024 SU5 or later and test SQL injection vectors are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual database query patterns
  • Multiple failed SQL queries from single user
  • Long or complex SQL statements in application logs

Network Indicators:

  • Unusual database connection patterns
  • SQL error messages in HTTP responses

SIEM Query:

source="epm_logs" AND ("sql" OR "database") AND ("error" OR "exception" OR "injection")

🔗 References

📤 Share & Export