
Redazione RHC : 10 December 2025 15:59
Ivanti has released an urgent update for its Endpoint Manager (EPM) platform, addressing a set of significant vulnerabilities that could allow attackers to execute code of their choosing or hijack administrative sessions.
Among the fixed vulnerabilities, there are four specific flaws, including one particularly critical one, marked with a high severity rating, which have been fixed thanks to this update.
For organizations that are unable to immediately apply the patch, it suggests segregating their networks as best they can, stating: “If customers have not exposed their solution to the Internet, the risk of this vulnerability is significantly reduced.”
A Stored Cross-Site Scripting (XSS) vulnerability tracked under CVE-2025-10573 has a CVSS score of 9.6. EPM software versions prior to 2024 SU4 SR1 are affected by this vulnerability.
The advisory states that the vulnerability allows an unauthenticated, remote attacker to execute JavaScript of their choice within an administration session.
The flaw requires user interaction, as it is likely that an administrator could be tricked into viewing a malicious page, but the risk of a full session hijacking makes it a top priority for defense officials.
In addition to the critical XSS bug, Ivanti has fixed three other high-severity vulnerabilities that expose the system to remote code execution (RCE) and unauthorized file manipulation:
While Ivanti states that it is “not aware of any customers being exploited by these vulnerabilities at the time of disclosure,” it strongly recommends customers update immediately.
Redazione