CVE-2025-62392

6.5 MEDIUM

📋 TL;DR

This SQL injection vulnerability in Ivanti Endpoint Manager allows authenticated attackers to read arbitrary data from the database. Organizations using Ivanti EPM versions before 2024 SU5 are affected. The attacker must have valid credentials to exploit this vulnerability.

💻 Affected Systems

Products:
  • Ivanti Endpoint Manager
Versions: All versions before 2024 SU5
Operating Systems: Windows Server, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the EPM web interface or API

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including sensitive configuration data, credentials, and endpoint information could be exfiltrated, potentially enabling lateral movement.

🟠

Likely Case

Attackers with valid credentials could extract sensitive endpoint management data, configuration details, and potentially escalate privileges.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to data accessible by the compromised account's permissions.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access; SQL injection techniques are well-documented and tools exist for exploitation

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024 SU5 or later

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-EPM-October-2025

Restart Required: No

Instructions:

1. Download Ivanti EPM 2024 SU5 or later from the Ivanti portal. 2. Follow standard Ivanti EPM upgrade procedures. 3. Verify the upgrade completed successfully.

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement additional input validation at the web application firewall or application layer

Database Access Restriction

all

Restrict database permissions for the EPM application account to minimum required privileges

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate EPM servers from other critical systems
  • Enforce strong authentication and implement multi-factor authentication for all EPM administrator accounts

🔍 How to Verify

Check if Vulnerable:

Check Ivanti EPM version in the web interface under Help > About or via command line: epm version

Check Version:

epm version

Verify Fix Applied:

Verify version is 2024 SU5 or later and test SQL injection attempts are properly blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual database queries from EPM application
  • Multiple failed SQL syntax attempts in web logs
  • Large data extraction patterns

Network Indicators:

  • Unusual database traffic patterns from EPM servers
  • SQL error messages in HTTP responses

SIEM Query:

source="epm_web_logs" AND ("sql" OR "union" OR "select" OR "from") AND status=200

🔗 References

📤 Share & Export