Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9872: CWE-434 Unrestricted Upload of File with Dangerous Type in Ivanti Endpoint Manager

0
High
VulnerabilityCVE-2025-9872cvecve-2025-9872cwe-434
Published: Tue Sep 09 2025 (09/09/2025, 15:11:13 UTC)
Source: CVE Database V5
Vendor/Project: Ivanti
Product: Endpoint Manager

Description

Insufficient filename validation in Ivanti Endpoint Manager before 2024 SU3 SR1 and 2022 SU8 SR2 allows a remote unauthenticated attacker to achieve remote code execution. User interaction is required.

AI-Powered Analysis

AILast updated: 09/17/2025, 01:16:10 UTC

Technical Analysis

CVE-2025-9872 is a critical vulnerability identified in Ivanti Endpoint Manager, specifically affecting versions prior to 2024 SU3 SR1 and 2022 SU8 SR2. The root cause is insufficient filename validation during file uploads, categorized under CWE-434 (Unrestricted Upload of File with Dangerous Type). This flaw allows a remote, unauthenticated attacker to upload malicious files that can lead to remote code execution (RCE) on the targeted system. Although user interaction is required to trigger the exploit, the vulnerability is severe due to the lack of authentication and the potential for full system compromise. The CVSS v3.1 base score of 8.8 reflects a high severity, with attack vector being network-based (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The impact on confidentiality, integrity, and availability is high, meaning an attacker could execute arbitrary code, potentially leading to data breaches, system manipulation, or denial of service. The vulnerability is present in a widely used endpoint management product, which is critical for managing and securing enterprise IT assets. The absence of published patches at the time of this report increases the urgency for mitigation and monitoring. No known exploits in the wild have been reported yet, but the nature of the vulnerability makes it a prime target for attackers once exploit code becomes available.

Potential Impact

For European organizations, the impact of CVE-2025-9872 could be significant. Ivanti Endpoint Manager is commonly used in enterprise environments to manage endpoints, deploy software, and enforce security policies. Successful exploitation could allow attackers to gain persistent, unauthorized access to corporate networks, leading to data exfiltration, disruption of business operations, and potential lateral movement within the network. Given the high confidentiality, integrity, and availability impact, sensitive personal data protected under GDPR could be exposed, resulting in regulatory penalties and reputational damage. The requirement for user interaction somewhat limits automated exploitation but does not eliminate risk, especially in environments where social engineering or phishing campaigns are prevalent. The vulnerability could also be leveraged in targeted attacks against critical infrastructure or government agencies within Europe, amplifying its potential consequences.

Mitigation Recommendations

European organizations should implement a multi-layered mitigation strategy beyond generic patching advice. First, immediately verify the Ivanti Endpoint Manager version in use and plan for prompt upgrade to versions 2024 SU3 SR1 or 2022 SU8 SR2 or later once patches are released. Until patches are available, restrict file upload capabilities within the Endpoint Manager interface by applying strict access controls and disabling unnecessary upload features. Implement network segmentation to isolate management consoles from general user networks, reducing the attack surface. Employ advanced endpoint protection solutions capable of detecting anomalous file uploads and execution attempts. Conduct targeted user awareness training to reduce the risk of social engineering that could trigger the required user interaction. Monitor logs and network traffic for unusual activity related to file uploads or execution on the Endpoint Manager server. Finally, consider deploying web application firewalls (WAFs) or intrusion prevention systems (IPS) with custom rules to detect and block suspicious upload attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ivanti
Date Reserved
2025-09-02T20:51:33.478Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0456a12a58f153632f085

Added to database: 9/9/2025, 3:19:06 PM

Last enriched: 9/17/2025, 1:16:10 AM

Last updated: 10/29/2025, 9:46:31 AM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats