First published: Tue May 13 2025(Updated: )
Ivanti Endpoint Manager Mobile (EPMM) contains a code injection vulnerability in the API component that allows an authenticated attacker to remotely execute arbitrary code via crafted API requests. This vulnerability results from an insecure implementation of the Hibernate Validator open-source library.
Credit: 3c1d8aa1-5a33-4ea4-8992-aadd6440af75
Affected Software | Affected Version | How to fix |
---|---|---|
Ivanti Endpoint Manager Mobile (EPMM) | <12.5.0.0 | |
Ivanti Endpoint Manager Mobile |
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-4428 has a critical severity level due to its potential for remote code execution.
To mitigate CVE-2025-4428, users should upgrade to Ivanti Endpoint Manager Mobile version 12.5.0.1 or later.
CVE-2025-4428 affects Ivanti Endpoint Manager Mobile versions 12.5.0.0 and earlier on unspecified platforms.
Yes, CVE-2025-4428 allows authenticated attackers, including unprivileged users, to execute arbitrary code.
While specific exploits for CVE-2025-4428 are not publicly detailed, the nature of the vulnerability suggests that crafted API requests can be used to exploit it.