प्लेटफ़ॉर्म
ivanti
घटक
ivanti-endpoint-manager
CVE-2025-10573 describes a stored Cross-Site Scripting (XSS) vulnerability present in Ivanti Endpoint Manager versions up to and including 2024 SU4 SR1. This flaw allows a malicious, unauthenticated attacker to inject and execute arbitrary JavaScript code within the context of an administrator's session. Successful exploitation requires user interaction, but the potential impact is severe due to the elevated privileges involved.
The impact of CVE-2025-10573 is significant due to the potential for complete account takeover. An attacker can leverage this XSS vulnerability to execute malicious scripts within the administrator's session, granting them full control over the Ivanti Endpoint Manager system. This could lead to unauthorized access to sensitive data, modification of system configurations, deployment of malware to managed endpoints, and potentially, lateral movement within the network. The requirement for user interaction is a factor, but social engineering techniques could be employed to trick administrators into triggering the vulnerability.
CVE-2025-10573 was publicly disclosed on 2025-12-09. As of this date, no public proof-of-concept (PoC) code has been released, but the vulnerability's severity and ease of exploitation suggest a high probability of exploitation. The vulnerability is not currently listed on CISA KEV, but its critical CVSS score warrants close monitoring. Active campaigns targeting Ivanti Endpoint Manager are possible, given the widespread use of the product.
Organizations heavily reliant on Ivanti Endpoint Manager for endpoint management and security are at significant risk. Specifically, environments with limited security awareness training among administrators, or those using older, unpatched versions of the software, are particularly vulnerable. Shared hosting environments where multiple users share the same Ivanti Endpoint Manager instance also face increased risk.
• windows / supply-chain: Monitor Ivanti Endpoint Manager logs for unusual JavaScript execution patterns. Use Windows Defender to scan for suspicious scripts.
Get-WinEvent -LogName Application -Filter "EventID=1001 and Source='Ivanti Endpoint Manager'" | Where-Object {$_.Message -match 'javascript:'}• linux / server: Monitor web server access logs for requests containing suspicious JavaScript code. • wordpress / composer / npm: N/A - This vulnerability is not related to WordPress, Composer, or npm. • database (mysql, redis, mongodb, postgresql): N/A - This vulnerability is not related to databases. • generic web: Use curl to test endpoints for XSS vulnerabilities. Inspect response headers for unusual content.
echo '<script>alert("XSS")</script>' | curl -X POST -d @- https://your-ivanti-endpoint-manager/some-endpointdisclosure
एक्सप्लॉइट स्थिति
EPSS
0.04% (12% शतमक)
CISA SSVC
CVSS वेक्टर
The primary mitigation for CVE-2025-10573 is to upgrade Ivanti Endpoint Manager to a version that includes the security patch. Ivanti has not yet released a fixed version as of the publication date. Until a patch is available, consider implementing temporary workarounds such as strict input validation on all user-supplied data, particularly in areas where administrator privileges are required. Web Application Firewalls (WAFs) configured to detect and block XSS payloads can also provide a layer of defense. Regularly review and audit administrator access controls to minimize the potential impact of a successful attack.
संग्रहीत XSS (Stored XSS) भेद्यता को ठीक करने के लिए Ivanti Endpoint Manager को 2024 SU4 SR1 से बाद के संस्करण में अपडेट करें। यह दूरस्थ, गैर-प्रमाणित हमलावरों को व्यवस्थापक सत्र के संदर्भ में मनमाना जावास्क्रिप्ट (JavaScript) निष्पादित करने से रोकेगा। अधिक विवरण और अपडेट निर्देश के लिए Ivanti सुरक्षा सलाहकार देखें।
भेद्यता विश्लेषण और गंभीर अलर्ट सीधे आपके ईमेल में।
CVE-2025-10573 is a critical stored XSS vulnerability affecting Ivanti Endpoint Manager versions up to 2024 SU4 SR1, allowing attackers to execute JavaScript in an administrator session.
You are affected if you are using Ivanti Endpoint Manager versions 2024 SU4 SR1 or earlier. Upgrade to a patched version as soon as it becomes available.
The recommended fix is to upgrade to a patched version of Ivanti Endpoint Manager. Monitor Ivanti's security advisories for the release of a fix.
While no public exploits are currently known, the vulnerability's severity and ease of exploitation suggest a high probability of exploitation. Monitor your systems closely.
Refer to the official Ivanti security advisory page for updates and information regarding CVE-2025-10573: [https://www.ivanti.com/support/security-advisories/]
अपनी डिपेंडेंसी फ़ाइल अपलोड करें और तुरंत जानें कि यह CVE और अन्य आपको प्रभावित करती हैं या नहीं।