Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-4427 PoC — Ivanti Endpoint Manager Mobile 安全漏洞

Source
Associated Vulnerability
Title:Ivanti Endpoint Manager Mobile 安全漏洞 (CVE-2025-4427)
Description:Ivanti Endpoint Manager Mobile(Ivanti EPMM)是美国Ivanti公司的一个移动管理软件引擎。 Ivanti Endpoint Manager Mobile 12.5.0.0及之前版本存在安全漏洞,该漏洞源于API组件身份验证绕过,可能导致访问受保护资源。
Readme
# CVE-2025-4427 and CVE-2025-4428 Ivanti EPMM Chain
Ivanti EPMM Pre-Auth RCE Chain 1day Detection Artifact Generator Tool
 

# Detection in Action

```
$ python3 watchTowr-vs-Ivanti-EPMM-CVE-2025-4427-CVE-2025-4428.py -H https://192.168.1.100
                         __         ___  ___________                   
         __  _  ______ _/  |__ ____ |  |_\__    ____\____  _  ________ 
         \ \/ \/ \__  \    ___/ ___\|  |  \|    | /  _ \ \/ \/ \_  __ \
          \     / / __ \|  | \  \___|   Y  |    |(  <_> \     / |  | \/
           \/\_/ (____  |__|  \___  |___|__|__  | \__  / \/\_/  |__|   
                                  \/          \/     \/                            
          
        watchTowr-vs-Ivanti-EPMM-rce-chain.py
        (*) CVE-2025-4427 and CVE-2025-4428 Pre-Auth RCE Chain Detection Artifact Generator

          - Sonny and Piotr of watchTowr 

[+] Starting Detection Artifact Generator for CVE-2025-4427 + CVE-2025-4428 Chain
[+] Executing `id` command
[+] VULNERABLE
```

# Description

This script attempts to detect if Ivanti EPMM is vulnerable to CVE-2025-4427 and CVE-2025-4428 Pre-Auth RCE chainchain. 

# Affected Versions

11.12.0.4 and prior
12.3.0.1 and prior
12.4.0.1 and prior
12.5.0.0 and prior

# Follow [watchTowr](https://watchTowr.com) Labs

For the latest security research follow the [watchTowr](https://watchTowr.com) Labs Team 

- https://labs.watchtowr.com/
- https://x.com/watchtowrcyber
File Snapshot

[4.0K] /data/pocs/207320fe46e419b735ae7108c273eebedfc920f1 ├── [1.4K] README.md └── [2.0K] watchTowr-vs-Ivanti-EPMM-CVE-2025-4427-CVE-2025-4428.py 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.