Home Ivanti CVE-2025-9712
Back to Ivanti

CVE-2025-9712

Ivanti Endpoint Manager - Endpoint Manager

Ivanti CVSS 8.8 Updated March 16, 2026

Executive Risk Summary

"A remote code execution vulnerability exists in Ivanti Endpoint Manager due to insufficient filename validation, allowing an unauthenticated attacker to execute code with user interaction. This vulnerability affects Ivanti Endpoint Manager before 2024 SU3 SR1 and 2022 SU8 SR2."

Operational Audit Arsenal

Target Type Executable
Target Asset Ivanti Endpoint Manager
Standard Path %ProgramFiles%\Ivanti\Endpoint Manager
PowerShell
# 🛠️ Senior Engineer Universal Audit
# Target: Ivanti Endpoint Manager (Executable)
$Targets = 'Ivanti Endpoint Manager'
$SearchPaths = @("$env:windir\System32", "$env:ProgramFiles", "${env:ProgramFiles(x86)}")

Get-ChildItem -Path $SearchPaths -Include $Targets -Recurse -ErrorAction SilentlyContinue | 
Select-Object FullName, @{Name="Version";Expression={$_.VersionInfo.ProductVersion}}

Patch Impact Forecast

Reboot Required Likely

Moderate

Internal Work Notes

Apply Ivanti Endpoint Manager patch 2024 SU3 SR1 or 2022 SU8 SR2 to mitigate remote code execution vulnerability

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Ivanti Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.