Skip to main content

CVE-2025-9872: CWE-434 Unrestricted Upload of File with Dangerous Type in Ivanti Endpoint Manager

High
VulnerabilityCVE-2025-9872cvecve-2025-9872cwe-434
Published: Tue Sep 09 2025 (09/09/2025, 15:11:13 UTC)
Source: CVE Database V5
Vendor/Project: Ivanti
Product: Endpoint Manager

Description

Insufficient filename validation in Ivanti Endpoint Manager before 2024 SU3 SR1 and 2022 SU8 SR2 allows a remote unauthenticated attacker to achieve remote code execution. User interaction is required.

AI-Powered Analysis

AILast updated: 09/09/2025, 15:19:25 UTC

Technical Analysis

CVE-2025-9872 is a critical vulnerability identified in Ivanti Endpoint Manager, a widely used IT asset and endpoint management solution. The vulnerability stems from insufficient filename validation during file uploads, classified under CWE-434 (Unrestricted Upload of File with Dangerous Type). This flaw allows a remote, unauthenticated attacker to upload malicious files that can lead to remote code execution (RCE) on the affected system. The vulnerability affects versions prior to the 2024 SU3 Security Update 1 and 2022 SU8 Security Update 2. Exploitation requires user interaction, such as convincing a user to upload or process a crafted file, but does not require any prior authentication, significantly lowering the barrier for attackers. The CVSS v3.1 base score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, no privileges required, but user interaction needed. Successful exploitation could allow attackers to execute arbitrary code with the privileges of the Ivanti Endpoint Manager service, potentially leading to full system compromise, lateral movement within enterprise networks, data exfiltration, or disruption of endpoint management operations. No known exploits are currently reported in the wild, but the severity and ease of exploitation make it a significant threat once weaponized. The lack of official patch links in the provided data suggests that organizations should urgently verify their update status and apply the relevant security updates to mitigate this vulnerability.

Potential Impact

For European organizations, the impact of CVE-2025-9872 is substantial due to the critical role Ivanti Endpoint Manager plays in managing and securing enterprise endpoints. A successful attack could lead to unauthorized control over endpoint devices, exposing sensitive corporate data and intellectual property. This could disrupt business continuity, especially in sectors reliant on endpoint management for compliance and operational stability, such as finance, healthcare, and critical infrastructure. The ability to execute remote code without authentication increases the risk of widespread compromise, potentially enabling attackers to deploy ransomware, conduct espionage, or sabotage IT operations. Given the interconnected nature of European enterprises and regulatory requirements like GDPR, a breach exploiting this vulnerability could also result in significant legal and financial penalties. The requirement for user interaction means social engineering or phishing campaigns could be used to facilitate exploitation, which remains a common attack vector in Europe. Overall, the vulnerability poses a high risk to confidentiality, integrity, and availability of IT assets across European organizations.

Mitigation Recommendations

European organizations should immediately verify the version of Ivanti Endpoint Manager in use and ensure they have applied the 2024 SU3 Security Update 1 or 2022 SU8 Security Update 2 or later. If updates are not yet applied, organizations should restrict access to the Ivanti Endpoint Manager upload functionality through network segmentation and strict access controls to minimize exposure. Implementing robust user training to recognize and avoid social engineering attempts that could trigger the required user interaction is critical. Additionally, organizations should monitor logs for unusual file upload activities and deploy endpoint detection and response (EDR) solutions to detect anomalous behaviors indicative of exploitation attempts. Employing application whitelisting and restricting execution privileges on managed endpoints can further reduce the risk of successful code execution. Regular vulnerability scanning and penetration testing focused on endpoint management infrastructure will help identify residual risks. Finally, maintaining an incident response plan that includes scenarios involving endpoint management compromise will improve preparedness.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ivanti
Date Reserved
2025-09-02T20:51:33.478Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0456a12a58f153632f085

Added to database: 9/9/2025, 3:19:06 PM

Last enriched: 9/9/2025, 3:19:25 PM

Last updated: 9/10/2025, 4:07:20 AM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats