Home Ivanti CVE-2025-13659
Back to Ivanti

CVE-2025-13659

Ivanti Endpoint Manager - Server

Ivanti CVSS 8.8 Updated March 16, 2026

Executive Risk Summary

"A remote, unauthenticated attacker can write arbitrary files on the Ivanti Endpoint Manager server, potentially leading to remote code execution. This vulnerability requires user interaction and affects versions prior to 2024 SU4 SR1."

Operational Audit Arsenal

Target Type Server
Target Asset Ivanti Endpoint Manager Server
Standard Path %programfiles%\Ivanti\Endpoint Manager
PowerShell
# 🛠️ Senior Engineer Universal Audit
# Target: Ivanti Endpoint Manager Server (Server)
$Targets = 'Ivanti Endpoint Manager Server'
$SearchPaths = @("$env:windir\System32", "$env:ProgramFiles", "${env:ProgramFiles(x86)}")

Get-ChildItem -Path $SearchPaths -Include $Targets -Recurse -ErrorAction SilentlyContinue | 
Select-Object FullName, @{Name="Version";Expression={$_.VersionInfo.ProductVersion}}

Patch Impact Forecast

Reboot Required Likely

Moderate

Internal Work Notes

Apply Ivanti Endpoint Manager version 2024 SU4 SR1 or later to mitigate CVE-2025-13659, which allows remote file writing and potential code execution.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Ivanti Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.