Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62384: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Ivanti Endpoint Manager

0
Medium
VulnerabilityCVE-2025-62384cvecve-2025-62384cwe-89
Published: Mon Oct 13 2025 (10/13/2025, 21:13:05 UTC)
Source: CVE Database V5
Vendor/Project: Ivanti
Product: Endpoint Manager

Description

SQL injection in Ivanti Endpoint Manager before version 2024 SU5 allows a remote authenticated attacker to read arbitrary data from the database.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/11/2026, 11:07:36 UTC

Technical Analysis

CVE-2025-62384 is an SQL injection vulnerability identified in Ivanti Endpoint Manager, a widely used IT asset and endpoint management solution. The flaw exists in versions prior to 2024 SU5 and stems from improper neutralization of special characters in SQL commands (CWE-89). This allows a remote attacker who has authenticated access to the system to craft malicious SQL queries that can read arbitrary data from the underlying database. The vulnerability does not require user interaction and has a low attack complexity, but does require the attacker to have valid credentials with some level of privilege. The CVSS v3.1 base score is 6.5, reflecting a medium severity primarily due to the confidentiality impact and the need for authentication. Exploitation could lead to unauthorized disclosure of sensitive information stored in the database, such as configuration details, user data, or other critical endpoint management information. No integrity or availability impacts are noted. No public exploits have been reported yet, but the vulnerability is publicly disclosed and should be considered a significant risk for organizations relying on Ivanti Endpoint Manager for endpoint security and management. The lack of a patch link indicates that remediation may still be pending or in progress, emphasizing the need for vigilance and interim mitigations.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized data disclosure from endpoint management systems, which often contain sensitive operational and security information. Exposure of such data could facilitate further attacks, including lateral movement or targeted intrusions. Organizations in sectors such as finance, healthcare, government, and critical infrastructure are particularly vulnerable due to the sensitive nature of their managed endpoints and regulatory requirements for data protection (e.g., GDPR). The requirement for authentication limits the threat to insiders or attackers who have compromised credentials, but given the network accessibility of Endpoint Manager, this remains a significant concern. Data breaches resulting from this vulnerability could lead to reputational damage, regulatory penalties, and operational disruptions. The medium severity rating suggests that while the vulnerability is serious, it is not immediately critical, but timely remediation is essential to prevent escalation.

Mitigation Recommendations

1. Apply the official Ivanti Endpoint Manager patch for version 2024 SU5 or later as soon as it becomes available. 2. Restrict access to the Endpoint Manager interface to trusted networks and users only, using network segmentation and firewall rules. 3. Enforce strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of credential compromise. 4. Monitor logs for unusual database query patterns or access attempts that could indicate exploitation attempts. 5. Conduct regular audits of user privileges to ensure least privilege principles are enforced, minimizing the impact if credentials are compromised. 6. If patching is delayed, consider deploying Web Application Firewalls (WAFs) with SQL injection detection rules tailored to Ivanti Endpoint Manager traffic. 7. Educate administrators and users about phishing and credential theft risks to prevent unauthorized access. 8. Maintain up-to-date backups of Endpoint Manager data to support recovery in case of an incident.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
ivanti
Date Reserved
2025-10-10T20:12:11.880Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ed6d2e38344d8bcf32487d

Added to database: 10/13/2025, 9:20:46 PM

Last enriched: 2/11/2026, 11:07:36 AM

Last updated: 3/24/2026, 8:39:09 PM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses