CVE-2025-62389

6.5 MEDIUM

📋 TL;DR

This SQL injection vulnerability in Ivanti Endpoint Manager allows authenticated attackers to read arbitrary data from the database. Organizations using Ivanti EPM versions before 2024 SU5 are affected. The attacker must have valid credentials to exploit this vulnerability.

💻 Affected Systems

Products:
  • Ivanti Endpoint Manager
Versions: All versions before 2024 SU5
Operating Systems: Windows Server, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. The attacker requires authenticated access to the EPM web interface or API.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including sensitive configuration data, credentials, and endpoint information leading to lateral movement across the network.

🟠

Likely Case

Data exfiltration of endpoint management data, potentially exposing system configurations and asset information.

🟢

If Mitigated

Limited data exposure due to database permissions and network segmentation restricting the attacker's access scope.

🌐 Internet-Facing: MEDIUM - While authentication is required, exposed management interfaces could be targeted by credential stuffing or phishing attacks.
🏢 Internal Only: HIGH - Authenticated internal users or compromised accounts could exploit this to escalate privileges and access sensitive data.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access and SQL injection knowledge. No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024 SU5 or later

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-EPM-October-2025

Restart Required: No

Instructions:

1. Download Ivanti Endpoint Manager 2024 SU5 or later from the Ivanti portal. 2. Backup current configuration and database. 3. Run the installer with administrative privileges. 4. Verify the update completed successfully.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to Ivanti EPM management interface to authorized administrative networks only.

Principle of Least Privilege

all

Review and minimize user accounts with access to the EPM interface, ensuring only necessary personnel have administrative access.

🧯 If You Can't Patch

  • Implement web application firewall (WAF) with SQL injection protection rules
  • Enable database auditing and monitor for unusual SQL query patterns

🔍 How to Verify

Check if Vulnerable:

Check Ivanti EPM version in the web interface under Help > About or via command line: epm version

Check Version:

epm version

Verify Fix Applied:

Verify version is 2024 SU5 or later in the web interface or via command line

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL query patterns in database logs
  • Multiple failed login attempts followed by successful authentication

Network Indicators:

  • Unusual database query traffic from EPM application servers
  • Large data transfers from EPM database

SIEM Query:

source="epm_logs" AND (sql OR query OR select) AND (error OR exception OR unusual)

🔗 References

📤 Share & Export