Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

ZDI Drops 13 Unpatched Ivanti Endpoint Manager Vulnerabilities

0
Low
Vulnerabilityremote
Published: Fri Oct 10 2025 (10/10/2025, 09:45:13 UTC)
Source: SecurityWeek

Description

The unpatched vulnerabilities allow attackers to execute arbitrary code remotely and escalate their privileges. The post ZDI Drops 13 Unpatched Ivanti Endpoint Manager Vulnerabilities appeared first on SecurityWeek .

AI-Powered Analysis

AILast updated: 10/10/2025, 09:49:15 UTC

Technical Analysis

The Zero Day Initiative (ZDI) published advisories detailing 13 unpatched vulnerabilities in Ivanti Endpoint Manager, a widely used endpoint management solution. These include 12 remote code execution (RCE) vulnerabilities and one local privilege escalation (LPE) flaw. The LPE vulnerability affects the AgentPortal service and arises from improper validation of user input, leading to deserialization of untrusted data and execution of code with SYSTEM privileges. The RCE vulnerabilities are located in multiple components such as Report_RunPatch, MP_Report_Run2, DBDR, PatchHistory, MP_QueryDetail2, MP_QueryDetail, MP_VistaReport, and Report_Run classes, as well as GetCountForQuery and OnSaveToDB methods. These RCE issues result from unsafe handling of user-supplied input used in SQL queries or file operations, enabling arbitrary code execution under the context of the service account or user. Exploitation requires authentication; some require admin credentials or user interaction, such as opening a malicious file or webpage. The most critical vulnerability has a CVSS-like score of 8.8, with others scoring 7.8 and 7.2, indicating high severity. Ivanti was notified of these flaws between November 2024 and June 2025 but has delayed patching, now targeting March 2026 for fixes. ZDI’s disclosure follows their 120-day policy, releasing limited advisories due to the vendor’s delayed response. The vulnerabilities pose significant risks, including remote arbitrary code execution and privilege escalation, which could lead to full system compromise. Currently, the primary mitigation is to restrict access and interaction with the vulnerable Endpoint Manager components until patches are released.

Potential Impact

For European organizations, these vulnerabilities present a substantial risk, especially for enterprises relying on Ivanti Endpoint Manager for endpoint security and patch management. Successful exploitation could allow attackers to execute arbitrary code remotely, escalate privileges to SYSTEM level, and potentially gain full control over affected systems. This could lead to data breaches, disruption of IT operations, and lateral movement within networks. Given the authentication requirement, insider threats or compromised credentials could facilitate attacks. The delay in patch availability prolongs exposure, increasing the window for attackers to develop exploits. Critical infrastructure, government agencies, and large enterprises in Europe that depend on Ivanti for endpoint management are particularly vulnerable. The impact extends to confidentiality, integrity, and availability of systems, potentially affecting compliance with GDPR and other regulatory frameworks. The need for user interaction in some cases also raises the risk of social engineering attacks. Overall, the threat could disrupt business continuity and damage organizational reputation.

Mitigation Recommendations

European organizations should immediately implement strict access controls to limit interaction with Ivanti Endpoint Manager components, especially the AgentPortal service and affected classes. Network segmentation should isolate management servers to reduce exposure. Enforce strong authentication mechanisms, including multi-factor authentication, to mitigate risks from compromised credentials. Monitor logs and network traffic for unusual activity related to Ivanti services. Employ application whitelisting and endpoint detection and response (EDR) solutions to detect and block exploitation attempts. Educate users about phishing and social engineering risks, particularly regarding opening suspicious files or links. Temporarily disable or restrict features that process user-supplied input if feasible. Maintain up-to-date backups and incident response plans tailored to potential endpoint compromise scenarios. Engage with Ivanti support for updates and prioritize patch deployment once available. Consider deploying virtual patching or compensating controls via web application firewalls or intrusion prevention systems to mitigate exploitation risks during the patch delay.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://www.securityweek.com/zdi-drops-13-unpatched-ivanti-endpoint-manager-vulnerabilities/","fetched":true,"fetchedAt":"2025-10-10T09:49:02.760Z","wordCount":1154}

Threat ID: 68e8d68e014f1108aab3a90e

Added to database: 10/10/2025, 9:49:02 AM

Last enriched: 10/10/2025, 9:49:15 AM

Last updated: 10/11/2025, 1:11:17 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats