Executive Risk Summary
"A local authenticated attacker can decrypt other users' passwords due to improper use of encryption in the agent of Ivanti Endpoint Manager before version 2024 SU3 and 2022 SU8 Security Update 1. This vulnerability allows attackers to access sensitive information, potentially leading to further exploitation."
Operational Audit Arsenal
Target Type Executable
Target Asset Ivanti Endpoint Manager Agent
Standard Path %ProgramFiles%\Ivanti\Endpoint Manager\Agent
PowerShell
# 🛠️ Senior Engineer Universal Audit
# Target: Ivanti Endpoint Manager Agent (Executable)
$Targets = 'Ivanti Endpoint Manager Agent'
$SearchPaths = @("$env:windir\System32", "$env:ProgramFiles", "${env:ProgramFiles(x86)}")
Get-ChildItem -Path $SearchPaths -Include $Targets -Recurse -ErrorAction SilentlyContinue |
Select-Object FullName, @{Name="Version";Expression={$_.VersionInfo.ProductVersion}} Patch Impact Forecast
Reboot Required Likely
Minimal to Moderate
Internal Work Notes
Apply Ivanti Endpoint Manager version 2024 SU3 or 2022 SU8 Security Update 1 to mitigate the risk of password decryption by local authenticated attackers.
Technical Intelligence & Operational Utilities • Delivered Weekly
Intelligence Sources
Related Ivanti Threats
Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.