Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Wiz Warns of Ongoing Exploitation of Recent Ivanti Vulnerabilities

Wiz warns that threat actors are chaining two recent Ivanti vulnerabilities to achieve unauthenticated remote code execution.

Ivanti vulnerability

Cybersecurity firm Wiz says threat actors are actively exploiting in the wild two recently patched Ivanti Endpoint Manager Mobile (EPMM) vulnerabilities.

Tracked as CVE-2025-4427 and CVE-2025-4428, the flaws are described as an authentication bypass and a post-authentication remote code execution (RCE) issue, and have been assessed with ‘medium severity’ ratings. They were found in two open source libraries integrated into EPMM.

Ivanti released fixes for both bugs on May 13, warning of zero-day exploitation against a limited number of customers and noting that the risk of compromise is significantly reduced if ACLs functionality in the portal or an external WAF is used to filter access to the API.

The authentication bypass, Wiz explains, exists because EPMM’s route configuration does not properly handle requests, exposing routes without authentication due to missing rules in the Spring framework’s security configuration.

The RCE bug exists because user-supplied input within error messages is handled unsafely when processed via a Spring function, allowing an attacker to craft a format parameter and execute arbitrary Java code.

According to Wiz, while each of the two security defects is a medium-severity vulnerability, their combination should be treated as a critical security risk.

“These flaws, which stem from unsafe use of Java Expression Language in error messages and misconfigured routing, can be exploited together to achieve unauthenticated RCE,” Wiz notes.

The cybersecurity firm says it has observed ongoing in-the-wild exploitation of these flaws since May 16, after proof-of-concept (PoC) exploit code was published.

Advertisement. Scroll to continue reading.

Wiz identified multiple payloads deployed as part of the observed attacks, including a Sliver beacon connecting to a command-and-control (C&C) IP address previously linked to the exploitation of other vulnerable appliances, including Palo Alto Networks products running PAN-OS.

“It appears that this IP address is still in operation by the threat actor, as its certificate hasn’t changed since November 2024. This continuity leads us to conclude that the same actor has been opportunistically targeting both PAN-OS and Ivanti EPMM appliances,” Wiz says.

Organizations are advised to update their Ivanti EPMM deployments to one of the patched versions, which include 11.12.0.5, 12.3.0.2, 12.4.0.2, and 12.5.0.1.

Related: Fortinet Patches Zero-Day Exploited Against FortiVoice Appliances

Related: SAP Patches Another Exploited NetWeaver Vulnerability

Related: Output Messenger Zero-Day Exploited by Turkish Hackers for Iraq Spying

Related: Second OttoKit Vulnerability Exploited to Hack WordPress Sites

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how the LOtL threat landscape has evolved, why traditional endpoint hardening methods fall short, and how adaptive, user-aware approaches can reduce risk.

Watch Now

Join the summit to explore critical threats to public cloud infrastructure, APIs, and identity systems through discussions, case studies, and insights into emerging technologies like AI and LLMs.

Register

People on the Move

Cloud security startup Upwind has appointed Rinki Sethi as Chief Security Officer.

SAP security firm SecurityBridge announced the appointment of Roman Schubiger as the company’s new CRO.

Cybersecurity training and simulations provider SimSpace has appointed Peter Lee as Chief Executive Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.