{"uuid": "1116da49-7873-49ec-8fb4-1b886d9369b4", "vulnerability": {"vulnId": "CVE-2025-4427", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "1116da49-7873-49ec-8fb4-1b886d9369b4"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2025-05-19T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2025-05-19T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2025-05-19T00:00:00Z"}, "scope": {"notes": "KEV entry: Ivanti Endpoint Manager Mobile (EPMM) Authentication Bypass Vulnerability | Affected: Ivanti / Endpoint Manager Mobile (EPMM) | Description: Ivanti Endpoint Manager Mobile (EPMM) contains an authentication bypass vulnerability in the API component that allows an attacker to access protected resources without proper credentials via crafted API requests. This vulnerability results from an insecure implementation of the Spring Framework open-source library. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2025-06-09 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM ; https://nvd.nist.gov/vuln/detail/CVE-2025-4427"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-288"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Endpoint Manager Mobile (EPMM)", "due_date": "2025-06-09", "date_added": "2025-05-19", "vendorProject": "Ivanti", "vulnerabilityName": "Ivanti Endpoint Manager Mobile (EPMM) Authentication Bypass Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2025-4427", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2025-4427"}]}
