Executive Risk Summary
"A local authenticated attacker can exploit insufficient server-side controls in the management console of Ivanti Workspace Control to escalate their privileges, potentially leading to unauthorized access and data breaches. This vulnerability affects Ivanti Workspace Control versions prior to 2025.2 (10.19.0.0)."
Operational Audit Arsenal
Target Type Executable
Target Asset Ivanti.Workspace.Control.exe
Standard Path %programfiles%\Ivanti\Workspace Control
PowerShell
# 🛠️ Senior Engineer Universal Audit
# Target: Ivanti.Workspace.Control.exe (Executable)
$Targets = 'Ivanti.Workspace.Control.exe'
$SearchPaths = @("$env:windir\System32", "$env:ProgramFiles", "${env:ProgramFiles(x86)}")
Get-ChildItem -Path $SearchPaths -Include $Targets -Recurse -ErrorAction SilentlyContinue |
Select-Object FullName, @{Name="Version";Expression={$_.VersionInfo.ProductVersion}} Patch Impact Forecast
Reboot Required Likely
Moderate
Internal Work Notes
CVE-2024-44106: Ivanti Workspace Control privilege escalation vulnerability, patch to version 2025.2 (10.19.0.0) or later to mitigate risk.
Technical Intelligence & Operational Utilities • Delivered Weekly
Intelligence Sources
Related Ivanti Threats
Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.