Home Ivanti CVE-2025-13662
Back to Ivanti

CVE-2025-13662

Ivanti Endpoint Manager - Patch Management Component

Ivanti CVSS 7.8 Updated March 16, 2026

Executive Risk Summary

"A remote unauthenticated attacker can execute arbitrary code in Ivanti Endpoint Manager prior to version 2024 SU4 SR1 due to improper verification of cryptographic signatures. This vulnerability requires user interaction and can lead to significant security risks if left unpatched."

Operational Audit Arsenal

Target Type Executable
Target Asset Ivanti Endpoint Manager Patch Management Component
Standard Path %programfiles%\Ivanti\Endpoint Manager
PowerShell
# 🛠️ Senior Engineer Universal Audit
# Target: Ivanti Endpoint Manager Patch Management Component (Executable)
$Targets = 'Ivanti Endpoint Manager Patch Management Component'
$SearchPaths = @("$env:windir\System32", "$env:ProgramFiles", "${env:ProgramFiles(x86)}")

Get-ChildItem -Path $SearchPaths -Include $Targets -Recurse -ErrorAction SilentlyContinue | 
Select-Object FullName, @{Name="Version";Expression={$_.VersionInfo.ProductVersion}}

Patch Impact Forecast

Reboot Required Likely

Moderate

Internal Work Notes

Apply Ivanti Endpoint Manager version 2024 SU4 SR1 or later to mitigate CVE-2025-13662, which allows remote code execution due to improper cryptographic signature verification.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Ivanti Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.