Source: BleepingComputer
Author: Sergiu Gatlan
URL: https://www.bleepingcomputer.com/news/security/ivanti-warns-of-critical-endpoint-manager-code-execution-flaw/
ONE SENTENCE SUMMARY:
Ivanti urges customers to patch critical Endpoint Manager vulnerabilities allowing remote code execution, emphasizing immediate action due to potential exploitation.
MAIN POINTS:
- Ivanti discloses a critical vulnerability in its Endpoint Manager (EPM) solution, CVE-2025-10573.
- The flaw enables unauthenticated attackers to execute code through low-complexity cross-site scripting.
- Ivanti’s EPM is designed for managing devices across Windows, macOS, Linux, Chrome OS, and IoT.
- Vulnerability involves stored XSS allowing JavaScript execution in admin session contexts.
- EPM isn’t intended for online exposure, yet hundreds are tracked exposed globally.
- Ivanti released patches for three high-severity flaws, needing user interaction and untrusted connections.
- No exploitation evidence yet, but EPM vulnerabilities have been previous targets.
- CISA warned about critical vulnerabilities in EPM appliances earlier this year.
- U.S. agencies were ordered to patch an actively exploited vulnerability in October 2024.
- A guide highlights the importance of scalable IAM strategies to meet modern demands.
TAKEAWAYS:
- Patch critical EPM vulnerabilities immediately to prevent potential exploitation.
- Ensure EPM solutions are not unnecessarily exposed online.
- Stay informed about cybersecurity advisories from Ivanti and agencies like CISA.
- Apply security updates consistently to safeguard against high-severity threats.
- Develop a scalable Identity and Access Management (IAM) strategy to handle evolving security requirements.