Executive Risk Summary
"A vulnerability in Ivanti Workspace Control before version 2025.2 (10.19.0.0) allows a local authenticated attacker to obtain OS credentials due to cleartext transmission of sensitive information in the management console. This vulnerability poses a significant risk to data integrity and confidentiality, as an attacker could exploit it to gain unauthorized access to sensitive information."
Operational Audit Arsenal
Target Type Executable
Target Asset Ivanti.Workspace.Control.exe
Standard Path %programfiles%\Ivanti\Workspace Control
PowerShell
# 🛠️ Senior Engineer Universal Audit
# Target: Ivanti.Workspace.Control.exe (Executable)
$Targets = 'Ivanti.Workspace.Control.exe'
$SearchPaths = @("$env:windir\System32", "$env:ProgramFiles", "${env:ProgramFiles(x86)}")
Get-ChildItem -Path $SearchPaths -Include $Targets -Recurse -ErrorAction SilentlyContinue |
Select-Object FullName, @{Name="Version";Expression={$_.VersionInfo.ProductVersion}} Patch Impact Forecast
Reboot Required Likely
Moderate
Internal Work Notes
Ivanti Workspace Control vulnerability (CVE-2024-44105) - upgrade to version 2025.2 (10.19.0.0) or later to prevent cleartext transmission of sensitive information in the management console.
Technical Intelligence & Operational Utilities • Delivered Weekly
Intelligence Sources
Related Ivanti Threats
Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.