Emerging Threathighexperimental

Potential Exploitation of CVE-2025-4427/4428 Ivanti EPMM Pre-Auth RCE

Detects potential exploitation of a chained vulnerability attack targeting Ivanti EPMM 12.5.0.0. CVE-2025-4427 allows unauthenticated access to protected API endpoints via an authentication bypass, which can then be leveraged to trigger CVE-2025-4428 — a remote code execution vulnerability through template injection. This sequence enables unauthenticated remote code execution, significantly increasing the impact of exploitation.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Swachchhanda Shrawan Poudel (Nextron Systems)Created Tue May 2041956f7c-7a6b-46d6-b6bb-da6eb2e83fbe2025
Emerging Threat
Active Threat

Developed to detect an active or emerging threat. Prioritize investigation of any alerts and correlate with threat intelligence.

Log Source
Web Server Log
CategoryWeb Server Log← raw: webserver

HTTP access logs from web servers capturing request paths, methods, and status codes.

Detection Logic
Detection Logic3 selectors
detection:
    selection_uri:
        cs-uri-stem|contains: '/mifs/rs/api/v2/featureusage'
        cs-uri-query|contains: 'format='
    selection_exploit_rce:
        - cs-uri-query|contains|all:
              - 'java.lang.Runtime'
              - '.getMethod'
              - 'getRuntime'
              - '.exec('
        - cs-uri-query|contains|all:
              - 'java%2elang%2eRuntime' # java.lang.Runtime
              - '%2egetMethod' # .getMethod
              - '%2eexec%28' # .exec(
        - cs-uri-query|contains:
              - '%6a%61%76%61%2e%6c%61%6e%67%2e%52%75%6e%74%69%6d%65%65%28%29' # java.lang.Runtime
              - '%67%65%74%52%75%6e%74%69%6d%65' # getRuntime
              - '%2e%65%78%65%63%28' # .exec(
    selection_exploit_template_injection:
        cs-uri-query|contains:
            - '{7*7}'
            - '%7B7*7%7D'
            - '%7b7%2a7%7d'
    condition: selection_uri and 1 of selection_exploit_*
False Positives
Unknown

False positive likelihood has not been assessed. Additional context may be needed during triage.

MITRE ATT&CK
Rule Metadata
Rule ID
41956f7c-7a6b-46d6-b6bb-da6eb2e83fbe
Status
experimental
Level
high
Type
Emerging Threat
Created
Tue May 20
Path
rules-emerging-threats/2025/Exploits/CVE-2025-4427/web_invanti_epmm_cve_2025_4427_and_cve_2025_4428.yml
Raw Tags
attack.initial-accessattack.t1190attack.executionattack.t1203cve.2025-4427cve.2025-4428detection.emerging-threats
View on GitHub