December 12 Advisory: Ivanti Endpoint Manager Stored XSS Vulnerability [CVE-2025-10573]

Rapid Response

Vulnerability Description

CVE-2025-10573 is a critical (CVSS 9.6) stored Cross-Site Scripting (XSS) vulnerability that allows a remote unauthenticated attacker to execute arbitrary JavaScript in the context of an administrator session. This can lead to session hijacking, privilege escalation, and potential compromise of the Ivanti Endpoint Manager (EPM) interface.

This vulnerability affects Ivanti Endpoint Manager versions prior to 2024 SU4 SR1 (11.0.6.2248). Version 2024 SU4 SR1 was released on December 9, 2025 and fixed the issue.

Screenshot-2025-12-12-at-4.30.11-PM.png
Map of exposed Ivanti EPM instances

See the full breakdown by country in Censys Platform → 

Screenshot-2025-12-12-at-4.32.32-PM.png
Map of vulnerable Ivanti EPM instances

See the full breakdown by country in Censys Platform (requires Starter or above license) → 

FieldDescription
CVE-IDCVE-2025-10573 — CVSS 9.6 — assigned by Ivanti
Vulnerability DescriptionA stored Cross-Site Scripting (XSS) vulnerability that allows a remote unauthenticated attacker to execute arbitrary JavaScript in the context of an administrator session. This can lead to session hijacking, privilege escalation, and potential compromise of the Ivanti EPM interface.
Date of DisclosureDecember 9, 2025
Affected AssetsIvanti Endpoint Manager (EPM) 
Vulnerable Software VersionsIvanti EPM instances running versions prior to 2024 SU4 SR1.
PoC Available?Rapid7’s post on this issue contains the technical details for exploiting this vulnerability.
Exploitation StatusNo known exploitation at time of writing, though attack complexity is rated “Low.” 
Patch StatusFixed in Ivanti EPM version 2024 SU4 SR1 available as of December 9, 2025. Immediately upgrade to Ivanti EPM version 2024 SU4 SR1 or later.

Censys Perspective 

At time of writing, Censys observes 1,898 exposed Ivanti EPM instances and 80 exposed instances running a vulnerable version.

Vulnerable instances can be found using the following queries:

Platform (requires Starter or above license to use regex): 

host.services.software: (
	product={
		"endpoint_manager",
		"landesk_management_suite"
	}
	and version=~"^(([0-9]|10).[0-9]+.[0-9]+.[0-9]+|11.0.[0-5].[0-9]+|11.0.6.([0-9]{1,3}|1[0-9]{3}|20[0-9]{2}|21[0-9]{2}|22[0-3][0-9]|224[0-7]))$"
)
or web.software: (
	product={
		"endpoint_manager",
		"landesk_management_suite"
	}
	and version=~"^(([0-9]|10).[0-9]+.[0-9]+.[0-9]+|11.0.[0-5].[0-9]+|11.0.6.([0-9]{1,3}|1[0-9]{3}|20[0-9]{2}|21[0-9]{2}|22[0-3][0-9]|224[0-7]))$"
)

ASM:

risks.name = "Vulnerable Ivanti Endpoint Manager [CVE-2025-10573]"

Legacy Search:

services.software: (
	vendor={"ivanti", "landesk"}
	and product={
		"landesk_management_suite",
		"endpoint_manager"
	}
	and version: /.*(([0-9]|10).[0-9]+.[0-9]+.[0-9]+|11.0.[0-5].[0-9]+|11.0.6.([0-9]{1,3}|1[0-9]{3}|20[0-9]{2}|21[0-9]{2}|22[0-3][0-9]|224[0-7]))([^0-9].*)?/
)

All exposed Ivanti EPM instances can be seen using the following queries:

Platform:

host.services.software.product={"endpoint_manager", "landesk_management_suite"} 

Legacy Search:

services.software: (vendor={"ivanti", "landesk"} and product={"landesk_management_suite", "endpoint_manager"})

References

Subscribe to our blog