Home Ivanti CVE-2024-7593
CRITICAL: THIS VULNERABILITY IS ACTIVELY BEING EXPLOITED IN THE WILD (CISA KEV CATALOG)
Back to Ivanti

CVE-2024-7593

Exploited

Ivanti vTM - Admin Panel

Ivanti CVSS 9.8 Updated March 16, 2026

Executive Risk Summary

"A remote unauthenticated attacker can bypass authentication of the admin panel in Ivanti vTM due to an incorrect implementation of an authentication algorithm, allowing for potential unauthorized access and control. This vulnerability affects versions other than 22.2R1 or 22.7R2, making it crucial to verify and update the version to prevent exploitation."

Operational Audit Arsenal

Target Type Web Application
Target Asset admin panel
Standard Path Management Plane

Manual Verification Required

This is a non-Windows asset (Ivanti). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Likely

Moderate

Internal Work Notes

CVE-2024-7593: Ivanti vTM admin panel authentication bypass vulnerability. Verify version and apply update to prevent unauthorized access.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Ivanti Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.