Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10985: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Ivanti Endpoint Manager Mobile

0
High
VulnerabilityCVE-2025-10985cvecve-2025-10985cwe-78
Published: Tue Oct 14 2025 (10/14/2025, 14:20:03 UTC)
Source: CVE Database V5
Vendor/Project: Ivanti
Product: Endpoint Manager Mobile

Description

OS command injection in the admin panel of Ivanti EPMM before version 12.6.0.2, 12.5.0.4, and 12.4.0.4 allows a remote authenticated attacker with admin privileges to achieve remote code execution.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 22:11:11 UTC

Technical Analysis

CVE-2025-10985 is an OS command injection vulnerability identified in the admin panel of Ivanti Endpoint Manager Mobile (EPMM) versions prior to 12.6.0.2, 12.5.0.4, and 12.4.0.4. The flaw arises from improper neutralization of special characters in OS commands (CWE-78), allowing a remote attacker who has authenticated admin privileges to inject and execute arbitrary operating system commands on the underlying server. This vulnerability does not require user interaction but does require high-level privileges, meaning the attacker must already have admin access to the EPMM console. Successful exploitation results in remote code execution (RCE), potentially compromising the confidentiality, integrity, and availability of the system and connected managed devices. The CVSS v3.1 base score is 7.2, reflecting high severity due to network exploitability, low attack complexity, and high impact on all security properties. Ivanti has reserved the CVE and published the vulnerability details, but no public exploits or patches are currently available at the time of this report. The vulnerability affects organizations relying on Ivanti EPMM for mobile device management, which is widely used in enterprise environments to manage and secure mobile endpoints. Attackers leveraging this vulnerability could gain control over the management infrastructure, potentially leading to widespread compromise of managed devices and sensitive corporate data.

Potential Impact

The impact of CVE-2025-10985 is significant for organizations using Ivanti Endpoint Manager Mobile as it enables remote code execution with admin privileges on the management server. This can lead to full system compromise, unauthorized access to sensitive data, disruption of mobile device management operations, and potential lateral movement within the corporate network. The compromise of the EPMM server could allow attackers to manipulate device configurations, deploy malicious payloads to managed devices, or exfiltrate confidential information. Given the central role of EPMM in enterprise mobile security, exploitation could severely undermine organizational security posture, disrupt business continuity, and result in regulatory compliance violations. Although exploitation requires admin authentication, insider threats or credential compromise scenarios increase the risk. The absence of known exploits in the wild currently reduces immediate risk but does not diminish the critical need for remediation.

Mitigation Recommendations

To mitigate CVE-2025-10985, organizations should: 1) Monitor Ivanti’s official channels for the release of security patches for versions prior to 12.6.0.2, 12.5.0.4, and 12.4.0.4 and apply them promptly once available. 2) Restrict administrative access to the EPMM console using strong authentication mechanisms such as multi-factor authentication (MFA) and limit admin privileges to only necessary personnel. 3) Implement network segmentation and firewall rules to restrict access to the EPMM admin interface to trusted IP addresses. 4) Conduct regular audits of admin accounts and monitor logs for unusual command execution or access patterns indicative of exploitation attempts. 5) Employ application-layer firewalls or intrusion detection/prevention systems (IDS/IPS) capable of detecting command injection attempts. 6) Educate administrators on secure credential management to reduce the risk of credential compromise. 7) Consider deploying endpoint detection and response (EDR) solutions on the management server to detect anomalous behavior. These measures combined will reduce the attack surface and improve detection and response capabilities until patches are applied.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
ivanti
Date Reserved
2025-09-25T16:32:56.765Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee5f184c738d5ce3163a17

Added to database: 10/14/2025, 2:32:56 PM

Last enriched: 2/26/2026, 10:11:11 PM

Last updated: 3/23/2026, 12:47:19 PM

Views: 106

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses