
Two critical zero-day vulnerabilities have been disclosed in Ivanti Endpoint Manager Mobile (EPMM), (formerly known as MobileIron Core), a widely used mobile device management solution. The flaws are already being actively exploited in the wild, prompting urgent mitigation guidance from multiple authorities.
Ivanti EPMM sits at the heart of mobile endpoint security, managing devices, policies, certificates, and authentication mechanisms. A successful compromise of such a platform can have far-reaching consequences, extending well beyond a single system.
What makes this situation particularly concerning is that:
The vulnerabilities allow remote exploitation
No authentication is required
Exploitation has already been confirmed
In other words, organizations with exposed EPMM instances face immediate risk.
The urgency of the situation is underlined by the unusually short remediation window imposed on certain organizations, measured in days, not weeks (US CISA forces the update to be done before Feb 1st). This reflects both the severity of the flaws and the confidence that threat actors are already leveraging them.
At this stage, the priority for security leaders is not just patching, but understanding:
Whether their environment is exposed
What realistic attack scenarios look like
How this fits into broader threat trends affecting endpoint and identity infrastructure
These questions go beyond public advisories and require context, prioritization, and intelligence-driven guidance.
Our World Watch advisory provides subscribers with:
Early intelligence on actively exploited vulnerabilities
Risk scoring and prioritization tailored for security decision-makers
Clear guidance on what matters now vs. what can wait
Context on how vulnerabilities are used by attackers
World Watch advisory on CVE-2025-4427: https://portal.cert.orangecyberdefense.com/worldwatch/advisory/1963
Our Managed Vulnerability Intelligence [watch] clients can directly consult the advisory including all the details related to this vulnerability from this address on our Threat Defense Center portal:
https://portal.cert.orangecyberdefense.com/vulns/123985
If you're interested to know more about this OCD managed service, please reach us at team[AT]cert.orangecyberdefense.com, indicating you're a World Watch beneficiary.