Home Ivanti CVE-2024-13813
Back to Ivanti

CVE-2024-13813

Ivanti Secure Access Client

Ivanti CVSS 7.1 Updated March 16, 2026

Executive Risk Summary

"A local authenticated attacker can exploit insufficient permissions in Ivanti Secure Access Client before version 22.8R1 to delete arbitrary files, potentially leading to data integrity issues. This vulnerability can be mitigated by updating to version 22.8R1 or later."

Operational Audit Arsenal

Target Type Executable
Target Asset Ivanti Secure Access Client
Standard Path %programfiles%IvantiSecure Access Client
PowerShell
# 🛠️ Senior Engineer Universal Audit
# Target: Ivanti Secure Access Client (Executable)
$Targets = 'Ivanti Secure Access Client'
$SearchPaths = @("$env:windir\System32", "$env:ProgramFiles", "${env:ProgramFiles(x86)}")

Get-ChildItem -Path $SearchPaths -Include $Targets -Recurse -ErrorAction SilentlyContinue | 
Select-Object FullName, @{Name="Version";Expression={$_.VersionInfo.ProductVersion}}

Patch Impact Forecast

Reboot Required Likely

Minimal

Internal Work Notes

Update Ivanti Secure Access Client to version 22.8R1 or later to prevent local authenticated attackers from deleting arbitrary files due to insufficient permissions.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Ivanti Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.