← Back to BrewedIntel
vulnerabilitycriticalRemote Code ExecutionZero-Day ExploitationCVE-2025-4427CVE-2025-4428

May 16, 2025 • GreyNoise Blog

Ivanti EPMM Zero-Days: Reconnaissance to Exploitation

Two critical zero-day vulnerabilities, CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager Mobile systems are actively being exploited...

Source
GreyNoise Blog
Category
vulnerability
Severity
critical

Executive Summary

Two critical zero-day vulnerabilities, CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager Mobile systems are actively being exploited following a surge in scanning activity. When chained, these flaws enable unauthenticated remote code execution, allowing attackers to bypass authentication and execute arbitrary commands on vulnerable servers. This poses a severe risk to organizations utilizing Ivanti EPMM for mobile device management, potentially leading to complete system compromise. The severity is classified as critical due to the lack of authentication required and the active exploitation status. While specific mitigation steps were not detailed in the report, immediate application of vendor patches and network segmentation are standard recommendations for such vulnerabilities. Security teams must prioritize identifying and securing exposed Ivanti instances to prevent unauthorized access. This campaign highlights the ongoing threat landscape targeting enterprise infrastructure through vulnerability chaining and reconnaissance-driven exploitation techniques requiring urgent attention.

Summary

Two critical Ivanti zero-days (CVE-2025-4427 and CVE-2025-4428) are now being actively exploited after a surge in scanning activity last month. When chained together, these vulnerabilities enable unauthenticated remote code execution on Ivanti Endpoint Manager Mobile systems.

Published Analysis

Two critical zero-day vulnerabilities, CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager Mobile systems are actively being exploited following a surge in scanning activity. When chained, these flaws enable unauthenticated remote code execution, allowing attackers to bypass authentication and execute arbitrary commands on vulnerable servers. This poses a severe risk to organizations utilizing Ivanti EPMM for mobile device management, potentially leading to complete system compromise. The severity is classified as critical due to the lack of authentication required and the active exploitation status. While specific mitigation steps were not detailed in the report, immediate application of vendor patches and network segmentation are standard recommendations for such vulnerabilities. Security teams must prioritize identifying and securing exposed Ivanti instances to prevent unauthorized access. This campaign highlights the ongoing threat landscape targeting enterprise infrastructure through vulnerability chaining and reconnaissance-driven exploitation techniques requiring urgent attention. Two critical Ivanti zero-days (CVE-2025-4427 and CVE-2025-4428) are now being actively exploited after a surge in scanning activity last month. When chained together, these vulnerabilities enable unauthenticated remote code execution on Ivanti Endpoint Manager Mobile systems. Two critical Ivanti zero-days (CVE-2025-4427 and CVE-2025-4428) are now being actively exploited after a surge in scanning activity last month. When chained together, these vulnerabilities enable unauthenticated remote code execution on Ivanti Endpoint Manager Mobile systems.

Linked Entities

  • CVE-2025-4427
  • CVE-2025-4428