IT Business Intelligence Tools & Solutions | Ivanti
AI Powered
Latest Product Updates and Feature Enhancements on Ivanti Xtraction
Fortinet, Ivanti, Nvidia Release Security Updates
Ivanti released security updates addressing multiple high- and medium-severity vulnerabilities in its products, including Endpoint Manager, Connect Secure, Policy Secure, ZTA Gateways, and Neurons fo...r Secure Access. The updates fix issues like insufficient filename validation and missing authorization, which could lead to code execution and unauthorized actions.
Ivanti Zero-Days Exploited to Drop MDifyLoader and Launch In-Memory Cobalt Strike Attacks
Ivanti's Connect Secure appliances were targeted by cyberattacks exploiting vulnerabilities CVE-2025-0282 and CVE-2025-22457, leading to the deployment of MDifyLoader and in-memory Cobalt Strike atta...cks. These flaws, patched by Ivanti in early 2025, allowed unauthorized remote code execution and arbitrary code execution. Ivanti emphasizes the importance of staying updated to protect against such threats.
Ivanti Endpoint Mobile Manager customers exploited via chained vulnerabilities
Ivanti has confirmed that hackers exploited vulnerabilities CVE-2025-4427 and CVE-2025-4428 in its Endpoint Mobile Manager (EPMM) software, enabling remote code execution. Ivanti urges all customers ...to upgrade to the latest fixed version. The flaws stem from issues in integrated open-source libraries, raising broader security concerns for enterprise mobile device management.
Ivanti Endpoint Mobile Manager customers exploited via chained vulnerabilities - Yahoo Finance
Ivanti has released urgent security updates for its Endpoint Manager Mobile (EPMM) platform after a critical zero-day vulnerability was discovered and actively exploited by attackers. The flaw allowe...d unauthorized access to sensitive data and system controls. Governments and enterprises are rapidly deploying the patch to protect mobile device management infrastructure and prevent further breaches.
Ivanti Patches EPMM Vulnerabilities Exploited for Remote Code Execution in Limited Attacks
Ivanti released security patches for Endpoint Manager Mobile (EPMM) to address two actively exploited vulnerabilities: CVE-2025-4427 (authentication bypass) and CVE-2025-4428 (remote code execution).... Attackers could chain these flaws for unauthenticated code execution. Updates are available for versions 11.12.0.5, 12.3.0.2, 12.4.0.2, and 12.5.0.1. Ivanti credited CERT-EU for discovery and confirmed limited exploitation.
Ivanti Connect Secure RCE Vulnerability Actively Exploited in the Wild ...
Ivanti disclosed a critical vulnerability, CVE-2025-22457, affecting its Connect Secure and other products, actively exploited since March 2025. The flaw allows remote code execution and has been use...d by the UNC5221 group for cyberattacks. Ivanti released patches for affected versions, urging immediate updates to mitigate risks. This incident highlights the need for robust cybersecurity measures and timely patching.
CISA Adds Actively Exploits Ivanti Connect Secure Vulnerability in ...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability (CVE-2025-22457) in Ivanti Connect Secure to its Known Exploited Vulnerabilities Catalog. This vuln...erability allows remote code execution and has been actively exploited since March 2025. Ivanti has released patches for Connect Secure, with additional patches for Policy Secure and ZTA Gateways due in April. Organizations are urged to apply these updates promptly to mitigate risks.
TRAILBLAZE & BRUSHFIRE Malware Deployed in Ivanti Apps / Services
Ivanti disclosed a critical security vulnerability in its Connect Secure VPN appliances, which has been patched. The flaw, CVE-2025-22457, allowed remote code execution but was fixed in version 22.7R...2.6.
Ivanti Discloses Exploitation Of Critical VPN Vulnerability
Ivanti disclosed a critical zero-day vulnerability in its Connect Secure VPN, which has been exploited, and a high-severity flaw that hasn't been exploited yet. Customers are advised to use the Integ...rity Checker Tool and upgrade if scans are clean.