đ¨ CISA Adds Five Actively Exploited Vulnerabilities in Advantive VeraCore and Ivanti EPM to KEV List

Cybercriminals are exploiting new vulnerabilities in widely used enterprise software, posing severe risks to businesses and government agencies. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added five critical security flaws in Advantive VeraCore and Ivanti Endpoint Manager (EPM) to its Known Exploited Vulnerabilities (KEV) catalog. These flaws are already under active exploitation, making immediate action essential.Â
The Vulnerabilities: A Backdoor for Attackers
According to CISA, the following vulnerabilities are being actively exploited:
- CVE-2024-57968 â đ ď¸Â Unrestricted file upload in Advantive VeraCore, allowing attackers to upload malicious files remotely viaÂ
upload.apsx
. - CVE-2025-25181 â đťÂ SQL Injection in Advantive VeraCore, enabling attackers to execute arbitrary SQL commands and manipulate databases.
- CVE-2024-13159 â đ Path Traversal in Ivanti EPM, exposing sensitive system information.
- CVE-2024-13160 â đ Another Ivanti EPM path traversal flaw, allowing unauthorized data access.
- CVE-2024-13161 â đľď¸ââď¸ A third path traversal issue in Ivanti EPM, making it possible to leak confidential files.
Whoâs Behind These Attacks?
- The XE Group, a Vietnamese threat actor, is suspected of exploiting VeraCore vulnerabilities using reverse shells and web shells.
- Meanwhile, Ivanti EPMâs flaws have seen the release of a proof-of-concept (PoC) exploit by cybersecurity firm Horizon3.ai, increasing the risk of widespread attacks.
How These Vulnerabilities Are Being Exploited
- Attackers are leveraging VeraCoreâs file upload flaw to insert malicious scripts, gaining a foothold in networks.
- Ivanti EPM vulnerabilities allow attackers to steal critical system files, potentially revealing authentication credentials, encryption keys, and other sensitive configurations.
This means attackers can move laterally within the network, escalate privileges, and launch further attacks, often without detection. đŤ
Why This Matters: A Growing Threat Landscape
These vulnerabilities pose a major risk to industries relying on Advantive VeraCore and Ivanti EPM, including:
- Logistics đ
- E-commerce đ
- IT Management đž
đ˘Â The rapid weaponization of PoC exploits accelerates the threat landscape. Many organizations fail to prioritize security updates for niche applicationsâleaving an open door for attackers.
đĄď¸ How to Protect Your Organization
Apply Security Patches Immediately âł
- CISA requires FCEB agencies to apply patches by March 31, 2025.
- All organizations should prioritize patching both Advantive and Ivanti systems.
Monitor Network Traffic for Unusual Activity đ
- Look for unexpected file uploads, unauthorized SQL queries, or suspicious system access.
Strengthen Access Controls đ
- Limit web application and database exposure to the internet.
- Implement multi-factor authentication (MFA).
Conduct Regular Security Audits đ ď¸
- Regularly assess third-party software vulnerabilities.
Stay Informed on Emerging Threats đ°
- Follow CISA alerts and threat intelligence sources.
Final Thoughts
đ These vulnerabilities reinforce one crucial fact:Â attackers will exploit ANY weaknessâwhether in mainstream software or overlooked enterprise tools.
- Stay proactive.
- Apply patches immediately.
- Monitor and reinforce security controls.
đĄÂ Cybersecurity is a never-ending battle. Stay patched, stay protected, and stay vigilant! đ