The Register: Ivanti patches two zero-days under active attack as intel agency warns customers

Source URL: https://www.theregister.com/2025/05/14/ivanti_patches_two_zerodays_and/
Source: The Register
Title: Ivanti patches two zero-days under active attack as intel agency warns customers

Feedly Summary: Vendor says vulns are linked with 2 mystery open source libraries integrated into EPMM product
Australia’s intelligence agency is warning organizations about several new Ivanti zero-days chained for remote code execution (RCE) attacks. The vendor itself has said the vulns are linked to two mystery open source libraries which it declined to name.…

AI Summary and Description: Yes

Summary: The text highlights a significant security concern regarding Ivanti’s EPMM product, linked to unidentified open source libraries that may introduce vulnerabilities. This warning from Australia’s intelligence agency underscores the critical need for organizations to closely monitor and manage third-party libraries to mitigate potential risks.

Detailed Description: The provided text addresses pressing issues in the realm of information security, particularly relating to zero-day vulnerabilities. The insights can be vital for professionals focused on security, compliance, and vulnerability management in software and infrastructure.

– **Context**:
– Ivanti, a vendor known for enterprise software solutions, has reportedly been linked to multiple vulnerabilities that could be exploited for remote code execution (RCE).
– These vulnerabilities are reportedly associated with two unnamed open source libraries integrated into their Enterprise Mobil Management (EPMM) product.

– **Status of the Vulnerabilities**:
– Classified as zero-days, these vulnerabilities are particularly dangerous because they are actively being exploited before a fix is available, leaving organizations exposed.

– **Recommendations**:
– **Monitoring**: Organizations should monitor communications from their software vendors closely for advisories on vulnerabilities and patches.
– **Code Audits**: It’s advisable to conduct thorough audits of third-party libraries being integrated into proprietary software to assess for known vulnerabilities.
– **Patch Management**: Businesses should establish robust patch management policies to swiftly address vulnerabilities when patches become available.

– **Implications**:
– The involvement of an intelligence agency in warning about these vulnerabilities underscores the potential severity of the risk and the need for proactive defensive measures.
– This situation is a critical reminder of the complexities introduced by open source components in commercial products and the importance of supply chain security.

In summary, this situation emphasizes the ongoing challenges faced in maintaining security posture while utilizing third-party and open source software components, particularly within cloud and on-premises infrastructure.