Sep 09, 2025 • Ivanti Security Advisories
September 2025 Security Update
Ivanti has released its September 2025 security updates, addressing vulnerabilities across several key products including Endpoint Manager (EPM), Connect...
Executive Summary
Ivanti has released its September 2025 security updates, addressing vulnerabilities across several key products including Endpoint Manager (EPM), Connect Secure, Policy Secure, ZTA Gateways, and Neurons for Secure Access. This monthly patch cycle underscores Ivanti's commitment to proactive vulnerability management and responsible transparency. Crucially, the vendor states there is currently no evidence indicating these vulnerabilities are being exploited in the wild. Despite the lack of active exploitation, immediate remediation is advised to prevent potential compromise. Security teams should prioritize applying these patches to mitigate risks associated with unauthorized access or privilege escalation. Customers are encouraged to consult the specific Security Advisories for detailed remediation instructions and CVE information. Ivanti Support remains available via the Success portal for assistance. Organizations should monitor Ivanti's RSS feed for future updates to maintain a robust security posture against emerging threats targeting these infrastructure components.
Summary
Ivanti releases standard security patches on the second Tuesday of every month. Our vulnerability management program is central to our commitment to maintaining secure products. Our philosophy is simple: discovering and communicating vulnerabilities, and sharing that information with defenders, is not an indication of weakness; rather it is evidence of rigorous scrutiny and a proactive vulnerability management program. By aggressively seeking to identify and address vulnerabilities, our aim is to get ahead of threat actors to ensure our customers can take the steps needed to protect their environments. At the core, we believe that responsible transparency helps protect our customers. We believe that responsible transparency helps protect our customers, and that CVE disclosures are an essential and effective tool to communicate software vulnerabilities. The purpose of assigning a CVE is to provide a beacon to security teams and signal the need for urgent updates. To that end, today Ivanti is disclosing vulnerabilities in Ivanti Endpoint Manager (EPM) and Ivanti Connect Secure, Policy Secure, ZTA Gateways and Neurons for Secure Access. It is important for customers to know: We have no evidence of any of these vulnerabilities being exploited in the wild. These vulnerabilities do not impact any other Ivanti solutions. More information on these vulnerabilities and detailed instructions on how to remediate the issues can be found in these Security Advisories: Ivanti Endpoint Manager (EPM) Ivanti Connect Secure, Policy Secure, ZTNA and nSA Our Support team is always available to help customers and partners should they have any questions. Cases can be logged via the Success portal (login credentials required). Want to stay up to date on Ivanti Security Advisories? Paste https://www.ivanti.com/blog/topics/security-advisory/rss into your preferred RSS reader / functionality in your email program.
Published Analysis
Ivanti has released its September 2025 security updates, addressing vulnerabilities across several key products including Endpoint Manager (EPM), Connect Secure, Policy Secure, ZTA Gateways, and Neurons for Secure Access. This monthly patch cycle underscores Ivanti's commitment to proactive vulnerability management and responsible transparency. Crucially, the vendor states there is currently no evidence indicating these vulnerabilities are being exploited in the wild. Despite the lack of active exploitation, immediate remediation is advised to prevent potential compromise. Security teams should prioritize applying these patches to mitigate risks associated with unauthorized access or privilege escalation. Customers are encouraged to consult the specific Security Advisories for detailed remediation instructions and CVE information. Ivanti Support remains available via the Success portal for assistance. Organizations should monitor Ivanti's RSS feed for future updates to maintain a robust security posture against emerging threats targeting these infrastructure components. Ivanti releases standard security patches on the second Tuesday of every month. Our vulnerability management program is central to our commitment to maintaining secure products. Our philosophy is simple: discovering and communicating vulnerabilities, and sharing that information with defenders, is not an indication of weakness; rather it is evidence of rigorous scrutiny and a proactive vulnerability management program. By aggressively seeking to identify and address vulnerabilities, our aim is to get ahead of threat actors to ensure our customers can take the steps needed to protect their environments. At the core, we believe that responsible transparency helps protect our customers. We believe that responsible transparency helps protect our customers, and that CVE disclosures are an essential and effective tool to communicate software vulnerabilities. The purpose of assigning a CVE is to provide a beacon to security teams and signal the need for urgent updates. To that end, today Ivanti is disclosing vulnerabilities in Ivanti Endpoint Manager (EPM) and Ivanti Connect Secure, Policy Secure, ZTA Gateways and Neurons for Secure Access. It is important for customers to know: We have no evidence of any of these vulnerabilities being exploited in the wild. These vulnerabilities do not impact any other Ivanti solutions. More information on these vulnerabilities and detailed instructions on how to remediate the issues can be found in these Security Advisories: Ivanti Endpoint Manager (EPM) Ivanti Connect Secure, Policy Secure, ZTNA and nSA Our Support team is always available to help customers and partners should they have any questions. Cases can be logged via the Success portal (login credentials required). Want to stay up to date on Ivanti Security Advisories? Paste https://www.ivanti.com/blog/topics/security-advisory/rss into your preferred RSS reader / functionality in your email program. Ivanti releases standard security patches on the second Tuesday of every month. Our vulnerability management program is central to our commitment to maintaining secure products. Our philosophy is simple: discovering and communicating vulnerabilities, and sharing that information with defenders, is not an indication of weakness; rather it is evidence of rigorous scrutiny and a proactive vulnerability management program. By aggressively seeking to identify and address vulnerabilities, our aim is to get ahead of threat actors to ensure our customers can take the steps needed to protect their environments. At the core, we believe that responsible transparency helps protect our customers. We believe that responsible transparency helps protect our customers, and that CVE disclosures are an essential and effective tool to communicate software vulnerabilities. The purpose of assigning a CVE is to provide a beacon to security teams and signal the need for urgent updates. To that end, today Ivanti is disclosing vulnerabilities in Ivanti Endpoint Manager (EPM) and Ivanti Connect Secure, Policy Secure, ZTA Gateways and Neurons for Secure Access. It is important for customers to know: We have no evidence of any of these vulnerabilities being exploited in the wild. These vulnerabilities do not impact any other Ivanti solutions. More information on these vulnerabilities and detailed instructions on how to remediate the issues can be found in these Security Advisories: Ivanti Endpoint Manager (EPM) Ivanti Connect Secure, Policy Secure, ZTNA and nSA Our Support team is always available to help customers and partners should they have any questions. Cases can be logged via the Success portal (login credentials required). Want to stay up to date on Ivanti Security Advisories? Paste https://www.ivanti.com/blog/topics/security-advisory/rss into your preferred RSS reader / functionality in your email program.