{"id":4319,"date":"2025-05-14T06:12:27","date_gmt":"2025-05-14T06:12:27","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/05\/14\/ivanti-patches-epmm-vulnerabilities-exploited-for-remote-code-execution-in-limited-attacks\/"},"modified":"2025-05-14T06:12:27","modified_gmt":"2025-05-14T06:12:27","slug":"ivanti-patches-epmm-vulnerabilities-exploited-for-remote-code-execution-in-limited-attacks","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/05\/14\/ivanti-patches-epmm-vulnerabilities-exploited-for-remote-code-execution-in-limited-attacks\/","title":{"rendered":"Ivanti Patches EPMM Vulnerabilities Exploited for Remote Code Execution in Limited Attacks"},"content":{"rendered":"<p>\u200bIvanti has released security updates to address two security flaws in Endpoint Manager Mobile (EPMM) software that have been chained in attacks to gain remote code execution.<br \/>\nThe vulnerabilities in question are listed below &#8211;<\/p>\n<p>CVE-2025-4427 (CVSS score: 5.3) &#8211; An authentication bypass in Ivanti Endpoint Manager Mobile allowing attackers to access protected resources without proper credentials\u00a0Ivanti has released security updates to address two security flaws in Endpoint Manager Mobile (EPMM) software that have been chained in attacks to gain remote code execution.<br \/>\nThe vulnerabilities in question are listed below &#8211;<\/p>\n<p>CVE-2025-4427 (CVSS score: 5.3) &#8211; An authentication bypass in Ivanti Endpoint Manager Mobile allowing attackers to access protected resources without proper credentials\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bIvanti has released security updates to address two security flaws in Endpoint Manager Mobile (EPMM) software that have been chained in attacks to gain remote code execution. The vulnerabilities in question are listed below &#8211; CVE-2025-4427 (CVSS score: 5.3) &#8211; An authentication bypass in Ivanti Endpoint Manager Mobile allowing attackers to access protected resources without&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/05\/14\/ivanti-patches-epmm-vulnerabilities-exploited-for-remote-code-execution-in-limited-attacks\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Ivanti Patches EPMM Vulnerabilities Exploited for Remote Code Execution in Limited Attacks<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":4320,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/4319"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=4319"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/4319\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/4320"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=4319"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=4319"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=4319"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}