{"uuid": "19865f5d-d18b-4ca7-a6e8-6128b6a4600b", "vulnerability": {"vulnId": "CVE-2025-4428", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "19865f5d-d18b-4ca7-a6e8-6128b6a4600b"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2025-05-19T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2025-05-19T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2025-05-19T00:00:00Z"}, "scope": {"notes": "KEV entry: Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability | Affected: Ivanti / Endpoint Manager Mobile (EPMM) | Description: Ivanti Endpoint Manager Mobile (EPMM) contains a code injection vulnerability in the API component that allows an authenticated attacker to remotely execute arbitrary code via crafted API requests. This vulnerability results from an insecure implementation of the Hibernate Validator open-source library, as represented by CVE-2025-35036. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2025-06-09 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM ; https://nvd.nist.gov/vuln/detail/CVE-2025-4428"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-94"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Endpoint Manager Mobile (EPMM)", "due_date": "2025-06-09", "date_added": "2025-05-19", "vendorProject": "Ivanti", "vulnerabilityName": "Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2025-4428", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2025-4428"}]}
