CVE-2025-9712

8.8 HIGH

📋 TL;DR

This vulnerability allows remote unauthenticated attackers to execute arbitrary code on Ivanti Endpoint Manager systems by exploiting insufficient filename validation. User interaction is required for successful exploitation. Organizations running affected Ivanti EPM versions are at risk.

💻 Affected Systems

Products:
  • Ivanti Endpoint Manager
Versions: Before 2024 SU3 SR1 and 2022 SU8 SR2
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: User interaction required for exploitation. Affects both Windows and Linux deployments of Ivanti EPM.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise leading to data theft, lateral movement, ransomware deployment, or complete network takeover.

🟠

Likely Case

Initial foothold leading to privilege escalation, credential harvesting, and installation of persistent backdoors.

🟢

If Mitigated

Limited impact due to network segmentation, strict access controls, and monitoring preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires user interaction but no authentication. CWE-434 indicates unrestricted upload of file with dangerous type.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024 SU3 SR1 or 2022 SU8 SR2

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-September-2025-for-Ivanti-EPM-2024-SU3-and-EPM-2022-SU8

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Ivanti support portal. 2. Backup current configuration. 3. Apply patch following Ivanti documentation. 4. Restart Ivanti EPM services. 5. Verify successful update.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Ivanti EPM management interface to trusted IPs only.

Web Application Firewall Rules

all

Implement WAF rules to block malicious file upload patterns.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Ivanti EPM from critical systems
  • Deploy additional monitoring and alerting for suspicious file upload activities

🔍 How to Verify

Check if Vulnerable:

Check Ivanti EPM version in administration console or via command line: epm version

Check Version:

epm version

Verify Fix Applied:

Verify version shows 2024 SU3 SR1 or 2022 SU8 SR2 or later in administration console

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload patterns
  • Suspicious process execution from Ivanti EPM directories
  • Failed authentication attempts followed by file uploads

Network Indicators:

  • Unusual outbound connections from Ivanti EPM server
  • File uploads to Ivanti EPM web interface from unexpected sources

SIEM Query:

source="ivanti_epm" AND (event="file_upload" OR event="process_execution")

🔗 References

📤 Share & Export