Home Ivanti CVE-2023-28324
Back to Ivanti

CVE-2023-28324

Ivanti Endpoint Manager - Core

Ivanti CVSS 9.8 Updated March 18, 2026

Executive Risk Summary

"A vulnerability in Ivanti Endpoint Manager 2022 and below allows for improper input validation, potentially leading to privilege escalation or remote code execution. This vulnerability poses a significant risk to the security and integrity of affected systems, as it could be exploited by attackers to gain unauthorized access or control."

Operational Audit Arsenal

Target Type Executable
Target Asset Ivanti Endpoint Manager Service
Standard Path %ProgramFiles%\Ivanti\Endpoint Manager
PowerShell
# 🛠️ Senior Engineer Universal Audit
# Target: Ivanti Endpoint Manager Service (Executable)
$Targets = 'Ivanti Endpoint Manager Service'
$SearchPaths = @("$env:windir\System32", "$env:ProgramFiles", "${env:ProgramFiles(x86)}")

Get-ChildItem -Path $SearchPaths -Include $Targets -Recurse -ErrorAction SilentlyContinue | 
Select-Object FullName, @{Name="Version";Expression={$_.VersionInfo.ProductVersion}}

Patch Impact Forecast

Reboot Required Likely

Moderate

Internal Work Notes

Ivanti Endpoint Manager vulnerability CVE-2023-28324 - apply patch from Ivanti support article SA-2023-06-06 to prevent privilege escalation or remote code execution

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Ivanti Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.