Aggregator
京东美团饿了么被约谈;淘宝推出「高退款人群屏蔽功能」;京东CEO:外卖入驻门店超百万,日均订单很快超过2000万 | 极客早知道
京东美团饿了么被约谈;淘宝推出「高退款人群屏蔽功能」;京东CEO:外卖入驻门店超百万,日均订单很快超过2000万 | 极客早知道
Weekly Report: フィッシング対策協議会が「SSL/TLS サーバー証明書におけるWHOIS情報を利用したドメイン名使用権確認方法の廃止について」を公開
dummy: Generator of static files for testing file upload
dummy Generator of static files for testing file upload functionality. When generating a png, as in the following screenshot, you can generate a png of a specified size. Motivation I often test the file...
The post dummy: Generator of static files for testing file upload appeared first on Penetration Testing Tools.
5G时代,企业工业网络安全防护升级策略
5G时代,企业工业网络安全防护升级策略
6月相约上海,共探商用密码创新蓝海,诚邀您拨冗参会
6月相约上海,共探商用密码创新蓝海,诚邀您拨冗参会
Microsoft’s Patch Tuesday closes 72 vulnerabilities, including 5 zero-days
The company has addressed zero-day vulnerabilities for eight consecutive months without deeming any of them critical at the time of disclosure.
The post Microsoft’s Patch Tuesday closes 72 vulnerabilities, including 5 zero-days appeared first on CyberScoop.
IDA如何调试So文件
Play
You must login to view this content
CVE-2025-4427, CVE-2025-4428: Ivanti Endpoint Manager Mobile (EPMM) Remote Code Execution
Remote code execution vulnerability in a popular mobile device management solution from Ivanti has been exploited in the wild in limited attacks
BackgroundOn May 13, Ivanti released a security advisory to address a high severity remote code execution (RCE) and a medium severity authentication bypass vulnerability in its Endpoint Manager Mobile (EPMM) product, a mobile management software that can be used for mobile device management (MDM), mobile application management (MAM) and mobile content management (MCM).
CVE Description CVSSv3 CVE-2025-4427 Ivanti Endpoint Manager Mobile Authentication Bypass Vulnerability 5.3 CVE-2025-4428 Ivanti Endpoint Manager Mobile Remote Code Execution Vulnerability 7.2 AnalysisCVE-2025-4427 is an authentication bypass vulnerability in Ivanti’s EPMM. An unauthenticated, remote attacker could exploit this vulnerability to gain access to the server’s application programming interface (API) that is normally only accessible to authenticated users.
CVE-2025-4428 is a RCE in Ivanti’s EPMM. An authenticated attacker could exploit this vulnerability to execute arbitrary code on a vulnerable device.
An attacker that successfully exploits these flaws could chain them together to execute arbitrary code on a vulnerable device without authentication. Both vulnerabilities are associated with open source libraries used by the EPMM software. Ivanti has indicated that these vulnerabilities have been exploited in the wild in a limited number of cases.
Customers that restrict API access via the Portal ACLs functionality or an external WAF have reduced exposure to these vulnerabilities.
Ivanti has credited the CERT-EU with reporting these vulnerabilities.
Proof of conceptAt the time this blog post was published, there was no public proof-of-concept available for CVE-2025-4427 or CVE-2025-4428.
SolutionThe following table details the affected and fixed versions of Ivanti EPMM for both CVE-2025-4427 and CVE-2025-4428:
Affected Version Fixed Version 11.12.0.4 and prior 11.12.0.5 12.3.0.1 and prior 12.3.0.2 12.4.0.1 and prior 12.4.0.2 12.5.0.0 and prior 12.5.0.1 Identifying affected systemsA list of Tenable plugins for this vulnerability can be found on the individual CVE pages for CVE-2025-4427, and CVE-2025-4428 as they’re released. This link will display all available plugins for these vulnerabilities, including upcoming plugins in our Plugins Pipeline.
Additionally, customers can utilize Tenable Attack Surface Management to identify public facing assets running Ivanti EPMM by using the following filters:
Get more information- Security Advisory Ivanti Endpoint Manager Mobile (EPMM) May 2025 (CVE-2025-4427 and CVE-2025-4428)https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM?language=en_US
Join Tenable's Security Response Team on the Tenable Community.
Learn more about Tenable One, the Exposure Management Platform for the modern attack surface.
The post CVE-2025-4427, CVE-2025-4428: Ivanti Endpoint Manager Mobile (EPMM) Remote Code Execution appeared first on Security Boulevard.
CVE-2025-4427, CVE-2025-4428: Ivanti Endpoint Manager Mobile (EPMM) Remote Code Execution
Remote code execution vulnerability in a popular mobile device management solution from Ivanti has been exploited in the wild in limited attacks
BackgroundOn May 13, Ivanti released a security advisory to address a high severity remote code execution (RCE) and a medium severity authentication bypass vulnerability in its Endpoint Manager Mobile (EPMM) product, a mobile management software that can be used for mobile device management (MDM), mobile application management (MAM) and mobile content management (MCM).
CVEDescriptionCVSSv3CVE-2025-4427Ivanti Endpoint Manager Mobile Authentication Bypass Vulnerability5.3CVE-2025-4428Ivanti Endpoint Manager Mobile Remote Code Execution Vulnerability7.2AnalysisCVE-2025-4427 is an authentication bypass vulnerability in Ivanti’s EPMM. An unauthenticated, remote attacker could exploit this vulnerability to gain access to the server’s application programming interface (API) that is normally only accessible to authenticated users.
CVE-2025-4428 is a RCE in Ivanti’s EPMM. An authenticated attacker could exploit this vulnerability to execute arbitrary code on a vulnerable device.
An attacker that successfully exploits these flaws could chain them together to execute arbitrary code on a vulnerable device without authentication. Both vulnerabilities are associated with open source libraries used by the EPMM software. Ivanti has indicated that these vulnerabilities have been exploited in the wild in a limited number of cases.
Customers that restrict API access via the Portal ACLs functionality or an external WAF have reduced exposure to these vulnerabilities.
Ivanti has credited the CERT-EU with reporting these vulnerabilities.
Proof of conceptAt the time this blog post was published, there was no public proof-of-concept available for CVE-2025-4427 or CVE-2025-4428.
SolutionThe following table details the affected and fixed versions of Ivanti EPMM for both CVE-2025-4427 and CVE-2025-4428:
Affected VersionFixed Version11.12.0.4 and prior11.12.0.512.3.0.1 and prior12.3.0.212.4.0.1 and prior12.4.0.212.5.0.0 and prior12.5.0.1Identifying affected systemsA list of Tenable plugins for this vulnerability can be found on the individual CVE pages for CVE-2025-4427, and CVE-2025-4428 as they’re released. This link will display all available plugins for these vulnerabilities, including upcoming plugins in our Plugins Pipeline.
Additionally, customers can utilize Tenable Attack Surface Management to identify public facing assets running Ivanti EPMM by using the following filters:
Get more informationJoin Tenable's Security Response Team on the Tenable Community.
Learn more about Tenable One, the Exposure Management Platform for the modern attack surface.
Building Effective Security Programs Requires Strategy, Patience, and Clear Vision
Windows Zero-Day Bug Exploited for Browser-Led RCE
Google adds suite of security features to Android 16
The company plans to add its Advanced Protection program on devices, as will use AI to detect and stop scams.
The post Google adds suite of security features to Android 16 appeared first on CyberScoop.
Chinese Actor Hit Taiwanese Drone Makers, Supply Chains
Feel Supported by Advanced IAM Strategies
Are You Maximizing the Potential of Your IAM Strategies? Effective data management requires a nuanced understanding of advanced Identity and Access Management (IAM) strategies. Where cyber threats are evolving at a rapid pace, an organization’s cybersecurity fortification needs to keep pace. When a crucial component of successful cybersecurity, IAM strategies are essential for controlling who […]
The post Feel Supported by Advanced IAM Strategies appeared first on Entro.
The post Feel Supported by Advanced IAM Strategies appeared first on Security Boulevard.
Secrets Management That Fits Your Budget
Is Your Secrets Management Strategy Straining Your Budget? Organizations are on the lookout for budget-friendly secrets management solutions that provide robust security without causing financial strain. I believe that a comprehensive Non-Human Identities (NHIs) management approach could be the answer. Understanding NHIs and the Need for Budget-Friendly Security Management Non-Human Identities (NHIs) are the machine […]
The post Secrets Management That Fits Your Budget appeared first on Entro.
The post Secrets Management That Fits Your Budget appeared first on Security Boulevard.