Home Ivanti CVE-2025-9872
Back to Ivanti

CVE-2025-9872

Ivanti Endpoint Manager - Endpoint Manager

Ivanti CVSS 8.8 Updated March 16, 2026

Executive Risk Summary

"A remote code execution vulnerability exists in Ivanti Endpoint Manager due to insufficient filename validation, allowing an unauthenticated attacker to execute code with user interaction. This vulnerability affects versions prior to 2024 SU3 SR1 and 2022 SU8 SR2."

Operational Audit Arsenal

Target Type Executable
Target Asset Ivanti Endpoint Manager
Standard Path %programfiles%IvantiEndpoint Manager
PowerShell
# 🛠️ Senior Engineer Universal Audit
# Target: Ivanti Endpoint Manager (Executable)
$Targets = 'Ivanti Endpoint Manager'
$SearchPaths = @("$env:windir\System32", "$env:ProgramFiles", "${env:ProgramFiles(x86)}")

Get-ChildItem -Path $SearchPaths -Include $Targets -Recurse -ErrorAction SilentlyContinue | 
Select-Object FullName, @{Name="Version";Expression={$_.VersionInfo.ProductVersion}}

Patch Impact Forecast

Reboot Required Likely

Moderate

Internal Work Notes

Apply Ivanti Endpoint Manager patch to mitigate remote code execution vulnerability (CVE-2025-9872)

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Ivanti Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.