Home Ivanti CVE-2025-4428
CRITICAL: THIS VULNERABILITY IS ACTIVELY BEING EXPLOITED IN THE WILD (CISA KEV CATALOG)
Back to Ivanti

CVE-2025-4428

Exploited

Ivanti Endpoint Manager - API component

Ivanti CVSS 7.2 Updated March 16, 2026

Executive Risk Summary

"A remote code execution vulnerability exists in Ivanti Endpoint Manager Mobile 12.5.0.0 and prior, allowing authenticated attackers to execute arbitrary code via crafted API requests. This vulnerability poses a significant risk to the security and integrity of the affected systems, as it can be exploited to gain unauthorized access and control."

Operational Audit Arsenal

Target Type API component
Target Asset API requests handler
Standard Path Global API Endpoint

Manual Verification Required

This is a non-Windows asset (Ivanti). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Likely

Moderate, potential service interruption during patch application

Internal Work Notes

Urgent: Ivanti Endpoint Manager Mobile vulnerability CVE-2025-4428 - apply patch to prevent remote code execution

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Ivanti Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.