CVE-2025-62392
📋 TL;DR
This SQL injection vulnerability in Ivanti Endpoint Manager allows authenticated attackers to read arbitrary data from the database. Organizations using Ivanti EPM versions before 2024 SU5 are affected. The attacker must have valid credentials to exploit this vulnerability.
💻 Affected Systems
- Ivanti Endpoint Manager
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including sensitive configuration data, credentials, and endpoint information could be exfiltrated, potentially enabling lateral movement.
Likely Case
Attackers with valid credentials could extract sensitive endpoint management data, configuration details, and potentially escalate privileges.
If Mitigated
With proper access controls and network segmentation, impact is limited to data accessible by the compromised account's permissions.
🎯 Exploit Status
Requires authenticated access; SQL injection techniques are well-documented and tools exist for exploitation
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2024 SU5 or later
Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-EPM-October-2025
Restart Required: No
Instructions:
1. Download Ivanti EPM 2024 SU5 or later from the Ivanti portal. 2. Follow standard Ivanti EPM upgrade procedures. 3. Verify the upgrade completed successfully.
🔧 Temporary Workarounds
Input Validation Enhancement
allImplement additional input validation at the web application firewall or application layer
Database Access Restriction
allRestrict database permissions for the EPM application account to minimum required privileges
🧯 If You Can't Patch
- Implement strict network segmentation to isolate EPM servers from other critical systems
- Enforce strong authentication and implement multi-factor authentication for all EPM administrator accounts
🔍 How to Verify
Check if Vulnerable:
Check Ivanti EPM version in the web interface under Help > About or via command line: epm version
Check Version:
epm version
Verify Fix Applied:
Verify version is 2024 SU5 or later and test SQL injection attempts are properly blocked
📡 Detection & Monitoring
Log Indicators:
- Unusual database queries from EPM application
- Multiple failed SQL syntax attempts in web logs
- Large data extraction patterns
Network Indicators:
- Unusual database traffic patterns from EPM servers
- SQL error messages in HTTP responses
SIEM Query:
source="epm_web_logs" AND ("sql" OR "union" OR "select" OR "from") AND status=200