See the Full Picture.
Published loading...Updated

Ivanti patches two 0-days and a critical make-me-admin bug

  • In May 2025, Ivanti issued patches to resolve two critical security flaws in its EPMM product that had been exploited in targeted attacks.
  • The vulnerabilities, CVE-2025-4427 and CVE-2025-4428, allow attackers to bypass authentication and execute remote code, posing a severe risk to affected organizations.
  • The authentication bypass flaw has a CVSS score of 5.3, while the remote code execution flaw scores 7.2, and exploiting both can enable unauthenticated system control.
  • Ivanti recommends upgrading to fixed EPMM versions 11.12.0.5, 12.3.0.2, 12.4.0.2, and 12.5.0.1, and suggests API access filtering using Portal ACLs or external web application firewalls to mitigate risk.
  • The incident highlights the importance of prompt patching and robust API controls for EPMM users, as a limited number of exploitations have occurred in real-world attacks.
Insights by Ground AI
Does this summary seem wrong?
Podcasts & Opinions

15 Articles

All
Left
Center
2
Right
Think freely.Subscribe and get full access to Ground NewsSubscriptions start at $9.99/yearSubscribe

Bias Distribution

  • 100% of the sources are Center
100% Center
Factuality

To view factuality data please Upgrade to Premium

Ownership

To view ownership data please Upgrade to Vantage

Mobile ID World broke the news in on Tuesday, May 13, 2025.
Sources are mostly out of (0)