CVE-2025-13659
Published: 09 December 2025
Description
Improper control of dynamically managed code resources in Ivanti Endpoint Manager prior to version 2024 SU4 SR1 allows a remote, unauthenticated attacker to write arbitrary files on the server, potentially leading to remote code execution. User interaction is required.
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the vulnerability by requiring timely patching of Ivanti Endpoint Manager to version 2024 SU4 SR1 as specified in the vendor advisory.
Ensures receipt and dissemination of security advisories like the Ivanti advisory for CVE-2025-13659 to enable prompt flaw remediation.
Verifies integrity of software, firmware, and information to detect unauthorized file writes and prevent execution of malicious code from exploited dynamic resources.
Security SummaryAI
CVE-2025-13659 involves improper control of dynamically managed code resources (CWE-913) in Ivanti Endpoint Manager versions prior to 2024 SU4 SR1. Published on 2025-12-09, the vulnerability enables a remote, unauthenticated attacker to write arbitrary files on the server, with potential for remote code execution, and carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H).
The attack requires user interaction to succeed, allowing a remote, unauthenticated attacker to exploit the flaw over the network with low complexity. Successful exploitation grants the ability to write arbitrary files on the affected server, which could escalate to remote code execution depending on the files written and server configuration.
Ivanti has issued a security advisory addressing this vulnerability, available at https://forums.ivanti.com/s/article/Security-Advisory-EPM-December-2025-for-EPM-2024, which provides details on mitigations and patches.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability enables remote, unauthenticated attackers to exploit a public-facing application in Ivanti Endpoint Manager for arbitrary file writes leading to potential RCE.