Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Attackers Target Ivanti EPMM Flaws, Breaching Major Sectors
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Attackers Target Ivanti EPMM Flaws, Breaching Major Sectors

Highlights

  • Ivanti EPMM flaws have enabled rapid cyberattacks on critical sectors.

  • Researchers debate whether vendor code or open-source libraries caused the vulnerabilities.

  • Patching processes and transparent communication remain essential for risk management.

Ethan Moreno
Last updated: 29 May, 2025 - 1:50 am 1:50 am
Ethan Moreno 1 day ago
Share
SHARE

A new wave of cyberattacks has struck organizations using Ivanti Endpoint Manager Mobile (EPMM), as threat actors rapidly exploit two recently disclosed vulnerabilities, CVE-2025-4427 and CVE-2025-4428. These incidents come at a time of heightened global concern about the security of network management software, with hackers seeking to breach high-value targets across multiple sectors. The attacks, attributed in part to the UNC5221 espionage group with links to China, highlight persistent risks for critical infrastructure operators and enterprise security providers. Security teams now face increased scrutiny over the effectiveness of patching and disclosure strategies in light of the recurring exploitation of Ivanti products. Recent discussions among cybersecurity professionals also reflect a broader debate about responsibility when vulnerabilities originate in third-party components.

Contents
What Do the CVE-2025-4427 and CVE-2025-4428 Flaws Enable?How Have Attackers Used These Vulnerabilities Against Key Sectors?Why Is the Root Cause and Vendor Responsibility Under Debate?

Public records and previous analyses have repeatedly noted Ivanti’s exposure to vulnerabilities, with several high-profile exploits in the last three years. Past attack campaigns often focused on the company’s Connect Secure products, but recent activity intensifies concerns as attackers shift focus to EPMM. Notably, security advisories in early 2024 and recurring inclusion of Ivanti vulnerabilities in national cyber risk catalogs have cemented the company’s status as a frequent target. Earlier reports differ in technical detail but reinforce common trends—escalating exploit attempts after disclosures, significant targeting by well-resourced adversaries, and industry criticisms about patching timelines and root cause transparency.

What Do the CVE-2025-4427 and CVE-2025-4428 Flaws Enable?

The two vulnerabilities affect Ivanti EPMM software by allowing remote code execution without authentication. Security researchers determined attackers can exploit these issues with minimal complexity, making them appealing for both state-sponsored groups and criminal enterprises. Initial exploitation occurred before Ivanti published disclosures or patches, characteristic of zero-day vulnerabilities. According to threat monitoring group GreyNoise, exploit attempts have increased significantly, with over a dozen distinct malicious sources identified in a short span.

How Have Attackers Used These Vulnerabilities Against Key Sectors?

Multiple organizations, including telecommunication providers, health care firms, aerospace companies, and transportation authorities, have been compromised through these vulnerabilities. The cyber unit UNC5221 has been identified in at least twenty attack attempts targeting internet-exposed EPMM instances, marking a continuation of their interest in Ivanti’s platforms since 2023. “Victim organizations span critical sectors in Europe, North America and the Asia-Pacific region,” said Arda Büyükkaya, a threat intelligence analyst who has tracked exploitation since the flaws first appeared.

Why Is the Root Cause and Vendor Responsibility Under Debate?

Uncertainty surrounds the source of these vulnerabilities, with Ivanti attributing them to third-party open-source libraries integrated into its software. The company’s official statements emphasize ongoing collaboration with these library maintainers to assess further disclosure or CVE assignment. Yet, independent researchers contest this interpretation, arguing the flaws stem from Ivanti’s implementation rather than inherent defects in the libraries.

“They know that it’s not a zero-day in a library that they’re using, but it is down to their code using said library incorrectly, which has introduced this weakness,”

explained Ben Harris, CEO at watchTowr, who expressed skepticism about Ivanti’s framing of the root cause. This divergence underscores challenges in attributing responsibility and securing complex software supply chains.

Recurring headlines about Ivanti’s vulnerabilities, especially on network edge devices like firewalls and VPNs, reflect risks facing enterprises dependent on third-party security vendors. Cybersecurity authorities documented at least thirty exploited Ivanti defects in recent years, highlighting repeated exploitation in ransomware campaigns and state-backed intrusions. While some observers point to the company’s prominence among high-value targets as a reason for frequent attacks, others point to persistent software quality and patch management issues. Ivanti’s approach, involving both acknowledgment and attribution to external components, illustrates the complexities faced by vendors whose products depend on the broader open-source ecosystem.

Understanding these recurring incidents equips organizations to better prioritize risk analysis when deploying products such as Ivanti EPMM. The combination of unauthenticated access and remote code execution magnifies the need for robust patching processes and timely threat intelligence. For enterprises, vendor communication and independent vulnerability research both play critical roles in managing software risk. Organizations should further scrutinize not only initial vulnerability disclosures but also the depth and clarity of vendor explanations, as misattribution can prolong remediation cycles and obscure defensive priorities. Ultimately, a combination of continuous monitoring, aggressive patching, and clear accountability across both vendor and open-source contributors will help manage exposure to similar threats in the future.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Treasury Department Stops Crypto Scam Network With Sanctions

Russian Cyber Group Strikes NATO and Ukraine, Hits Key Sectors

International Sting Disrupts Core Ransomware Infrastructure

Authorities Disrupt DanaBot Cybercrime Network with Global Effort

Global Operation Disrupts 10 Million Device Malware Network

Share This Article
Facebook Twitter Copy Link Print
Ethan Moreno
By Ethan Moreno
Ethan Moreno, a 35-year-old California resident, is a media graduate. Recognized for his extensive media knowledge and sharp editing skills, Ethan is a passionate professional dedicated to improving the accuracy and quality of news. Specializing in digital media, Moreno keeps abreast of technology, science and new media trends to shape content strategies.
Previous Article Analyst Cites Concerns as Future Fund Sells All Tesla Shares
Next Article Nvidia Targets Budget Gaming Laptops with New RTX 5050 Launch

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Wordle Players Tackle Double Letter Challenge With ‘IDIOM’ Solution
Gaming
Investors Demand Musk Commit to Tesla as Sales Drop
Electric Vehicle Technology
Tesla Tests Compact Model Y Prototype at Fremont Facility
Electric Vehicle
AI Robocall Firms Admit to Voter Intimidation in Biden Case Settlement
Technology
Tesla Schedules Robotaxi and Self-Delivery Launches for June
Electric Vehicle
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?