Home Ivanti CVE-2023-35084
Back to Ivanti

CVE-2023-35084

Ivanti Endpoint Manager - Core Server

Ivanti CVSS 9.8 Updated March 18, 2026

Executive Risk Summary

"The Ivanti Endpoint Manager is vulnerable to unsafe deserialization of user input, which could allow an attacker to execute commands remotely. This vulnerability affects Ivanti Endpoint Manager 2022 su3 and all previous versions."

Operational Audit Arsenal

Target Type Executable
Target Asset Ivanti Endpoint Manager Core Server
Standard Path %programfiles%Ivanti\Endpoint Manager\Core Server
PowerShell
# 🛠️ Senior Engineer Universal Audit
# Target: Ivanti Endpoint Manager Core Server (Executable)
$Targets = 'Ivanti Endpoint Manager Core Server'
$SearchPaths = @("$env:windir\System32", "$env:ProgramFiles", "${env:ProgramFiles(x86)}")

Get-ChildItem -Path $SearchPaths -Include $Targets -Recurse -ErrorAction SilentlyContinue | 
Select-Object FullName, @{Name="Version";Expression={$_.VersionInfo.ProductVersion}}

Patch Impact Forecast

Reboot Required Likely

Moderate

Internal Work Notes

CVE-2023-35084: Ivanti Endpoint Manager vulnerable to remote command execution due to unsafe deserialization of user input. Apply patch from Ivanti to mitigate risk.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Ivanti Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.