<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Patch Management</title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/blog/topics/patch-management/rss" /><link>https://www.ivanti.com/blog/topics/patch-management</link><item><guid isPermaLink="false">1c8ff1fb-4b1f-4f6d-93a5-1e1eb9619ac2</guid><link>https://www.ivanti.com/blog/april-2026-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><category>Patch Management</category><title>April 2026 Patch Tuesday</title><description>&lt;p&gt;The lead up to Patch Tuesday has been interesting. We had a Google Chrome zero-day (CVE-2026-5281) that was patched on April 1, an Adobe Acrobat Reader zero-day (&lt;a href="https://helpx.adobe.com/security/products/acrobat/apsb26-43.html" rel="noopener" target="_blank"&gt;CVE-2026-34621&lt;/a&gt;) late in the day on Friday April 10, and several older CVEs that were added to the CISA KEV list yesterday (&lt;a href="https://www.cisa.gov/news-events/alerts/2026/04/13/cisa-adds-seven-known-exploited-vulnerabilities-catalog" rel="noopener" target="_blank"&gt;April 13&lt;/a&gt;). All of this amidst a lot of industry buzz about Anthropic Mythos and &lt;a href="https://www.anthropic.com/glasswing" rel="noopener" target="_blank"&gt;Project Glasswing&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;What is the correlation between these events and Project Glasswing you ask? Most of the discussions around Mythos have been focused on where it will be used and the ramifications.&lt;/p&gt;

&lt;p&gt;Finding exploitable flaws in code can be a powerful tool for good when used by the vendor writing the code before it is released. However, it will also be used by researchers and threat actors to find flaws in code that is already released and that is where my speculation is directed.&lt;/p&gt;

&lt;p&gt;Consider the knock-on effects of a massive model like Mythos and what it will mean near term and longer term for the software that companies consume. Near term you will have the big players using a solution like this to release more secure code. As researchers and threat actors adopt more robust AI models to identify exploitable flaws this will result in more coordinated disclosures (good), zero-day exploits (bad) and n-day exploits (bad). All of this will result in more frequent, and more importantly, urgent software updates.&lt;/p&gt;

&lt;p&gt;Many organizations currently struggle to keep up with priority updates resolving exploited vulnerabilities when they occur outside of their normal monthly maintenance. I suspect most organizations were not aware of the Adobe Acrobat zero-day exploit until the CISA KEV update yesterday. This means that threat actors had another 2-3 days of free reign to exploit CVE-2026-34621 before most organizations became aware and many of those organizations will likely handle the update as part of their regular maintenance that is starting today on Patch Tuesday.&lt;/p&gt;

&lt;p&gt;Browser security updates are a weekly occurrence. Many other applications that users are utilizing regularly release updates on a continuous cadence, not a set monthly release date. This means many of the user targeted exploits are going to occur in software that is releasing outside of the average organizations maintenance schedules and that frequency is about to increase. It is hard to say if that increase is going to be 1.5x or 5x, but rest assured that the increase will be noticeable and will exacerbate a challenge that most organizations already struggle with – timely patch management.&lt;/p&gt;

&lt;p&gt;Enter Exposure Management. This is really a mindset and maturity change as much as a technology evolution. The mindset change requires us to consider a world where we need to make the decisions up front and monitor those decisions. This is called defining your Risk Appetite and monitoring your Risk Posture. Doing this effectively matures an organizations’ response to risks and makes remediation activities much more clear cut.&lt;/p&gt;

&lt;p&gt;The technology evolution requires the traditional vulnerability assessment technologies to integrate into a broader ecosystem where asset visibility or system of record comes together with vulnerability assessment and vulnerability intelligence solutions to refine when risks require more immediate action vs waiting for your regular maintenance activities to occur. Most important is the need for this tech stack to be integrated with your AEM (Autonomous Endpoint Management) platform as this is where remediation predominantly (and automatically) occurs.&lt;/p&gt;

&lt;p&gt;Now, back to our regularly scheduled Patch Tuesday update. Microsoft has resolved 169 CVEs this month which is a massive patch Tuesday lineup. April Patch Tuesday is the second-largest Patch Tuesday on record behind the October 2025 Patch Tuesday which resolved 175 CVEs. The lineup includes one zero-day exploit (CVE-2026-3220) and one public disclosure (CVE-2026-33825) and breaks down into 8 Critical, 156 Important, 3 Moderate and 1 Low severity.&lt;/p&gt;

&lt;p&gt;The zero-day CVE is in Microsoft SharePoint and the public disclosure is in Microsoft Defender making those two updates the most urgent for this month in addition to the Adobe Acrobat and Google Chrome updates leading up to Patch Tuesday.&lt;/p&gt;

&lt;h2&gt;Microsoft’s known exploited vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft resolved a Server Spoofing Vulnerability in Microsoft SharePoint (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32201" rel="noopener" target="_blank"&gt;CVE-2026-32201&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 6.5, but it has been confirmed to be exploited in the wild. An attacker who successfully exploits this vulnerability can view sensitive information and make changes to the disclosed information. The vulnerability affects SharePoint server Subscription Edition, SharePoint Server 2019 and SharePoint Server 2016. A risk-based prioritization methodology warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft resolved an Elevation of Privilege Vulnerability in Microsoft Defender (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825" rel="noopener" target="_blank"&gt;CVE-2026-33825&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.8, but has been publicly disclosed. The CVE lists exploit code maturity as Proof-of-Concept which puts this at a higher risk of exploitation. An attacker could use this vulnerability to allow an authorized attacker to elevate their privileges to SYSTEM on the local machine.&lt;/p&gt;

&lt;h2&gt;Ivanti security advisories&lt;/h2&gt;

&lt;p&gt;Ivanti has released one security update for April. The update affects Ivanti Neurons for ITSM and resolves two CVEs. More details and information about mitigations can be found in the&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/april-2026-security-update"&gt;April Security Advisory&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities&lt;/h2&gt;

&lt;p&gt;Adobe has released twelve updates this month, eleven of which released on Patch Tuesday and the zero-day update for Acrobat that released on Friday, April 10. 54 CVEs were resolved with a breakdown of 39 Critical, 13 Important and 2 Moderate. APSB26-43 resolved the zero-day exploit (&lt;a href="https://helpx.adobe.com/security/products/acrobat/apsb26-43.html" rel="noopener" target="_blank"&gt;CVE-2026-34621&lt;/a&gt;).&lt;/p&gt;

&lt;h2&gt;April update to-do list&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Adobe Acrobat (&lt;a href="https://helpx.adobe.com/security/products/acrobat/apsb26-43.html" rel="noopener" target="_blank"&gt;CVE-2026-34621&lt;/a&gt;) and Google Chrome (CVE-2026-5281) each had zero-day exploits leading up to Patch Tuesday. Ensure that you are prioritizing remediation of these two products to the latest version.&lt;/li&gt;
	&lt;li&gt;Microsoft SharePoint includes a zero-day exploit (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32201" rel="noopener" target="_blank"&gt;CVE-2026-32201&lt;/a&gt;) and should be investigated as a priority especially if you have known update challenges with your SharePoint environments.&lt;/li&gt;
	&lt;li&gt;The Microsoft Windows OS update this month resolves 133 CVEs (depending on edition) and includes 4 Critical CVEs. This update will resolve a significant number of findings across your environment.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 14 Apr 2026 22:51:36 Z</pubDate></item><item><guid isPermaLink="false">102f3f22-125a-4763-b596-62b424778efc</guid><link>https://www.ivanti.com/blog/autonomous-endpoint-management-eliminates-patch-silos</link><atom:author><atom:name>Aruna Kureti</atom:name><atom:uri>https://www.ivanti.com/blog/authors/aruna-kureti</atom:uri></atom:author><category>Artificial Intelligence</category><category>Patch Management</category><title>How AI-Driven Automation Solves Patch Management Silos</title><description>&lt;p&gt;&lt;em&gt;"We see 10,000&amp;nbsp;critical vulnerabilities!"&amp;nbsp;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;"We patched everything last week!"&amp;nbsp;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;This conversation happens in enterprise IT departments every single day. Security teams present dashboards filled with red alerts. IT teams show deployment reports at 98% success. Both teams are looking at real data.&amp;nbsp;Both are absolutely correct.&amp;nbsp;And both are&amp;nbsp;totally&amp;nbsp;blind to what's actually happening across the endpoint environment.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This&amp;nbsp;isn't&amp;nbsp;a&amp;nbsp;people&amp;nbsp;problem — your teams&amp;nbsp;aren't&amp;nbsp;incompetent.&amp;nbsp;It's&amp;nbsp;not a process problem — your workflows&amp;nbsp;aren't&amp;nbsp;broken.&amp;nbsp;It's&amp;nbsp;a technology problem:&amp;nbsp;you're&amp;nbsp;asking two teams to manage the same risk using systems that&amp;nbsp;show them different realities.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Security teams are given one version of reality through vulnerability scanners and threat intelligence. Meanwhile, IT teams see things differently when looking at their device management and patch deployment reports.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The tricky part is that both views can be&amp;nbsp;correct&amp;nbsp;in isolation and&amp;nbsp;still&amp;nbsp;be&amp;nbsp;misleading&amp;nbsp;in practice.&amp;nbsp;That's&amp;nbsp;how you end up in the familiar stalemate: security reports thousands of critical vulnerabilities; IT reports that patches are successfully deployed. The disconnect lives in the gap between those systems.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Why&amp;nbsp;IT&amp;nbsp;and&amp;nbsp;security&amp;nbsp;are misaligned on patching&amp;nbsp;&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Most organizations approach&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/endpoint-management-ownership-it-security-governance"&gt;patching misalignment between IT and security&lt;/a&gt;&amp;nbsp;by improving communication between IT and security. They schedule more meetings. They create escalation paths. They implement SLAs. And six months later,&amp;nbsp;they're&amp;nbsp;having the exact same argument with better PowerPoint slides.&lt;/p&gt;

&lt;p&gt;Here's&amp;nbsp;what nobody wants to admit:&amp;nbsp;you&amp;nbsp;can't&amp;nbsp;collaborate your way out of a data fragmentation problem. When IT and security are working from fundamentally different inventories of what exists,&amp;nbsp;what's&amp;nbsp;vulnerable&amp;nbsp;and&amp;nbsp;what's&amp;nbsp;been fixed, adding more coordination overhead just slows down an already broken process.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This is why the same conversation plays out again and again inside many organizations.&amp;nbsp;Both teams are confident in their data, and both are “right” within the narrow context of the tools they rely on.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;And&amp;nbsp;that’s&amp;nbsp;the problem. While both views are “right,” neither reflects the full lifecycle of risk. Vulnerability data&amp;nbsp;doesn’t&amp;nbsp;always reflect whether affected devices are managed or reachable. Patch reports&amp;nbsp;don’t&amp;nbsp;always account for unmanaged,&amp;nbsp;misclassified&amp;nbsp;or&amp;nbsp;newly discovered endpoints that still have access to corporate resources.&amp;nbsp;What’s missing is a reliable answer to the only question that actually matters: which endpoints are exposed right now?&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Technology silos create conflicting realities&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Most enterprises manage endpoints through&amp;nbsp;a hodgepodge of&amp;nbsp;systems that&amp;nbsp;have evolved&amp;nbsp;independently over time, each capturing only a fragment of reality.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;One system may surface critical exposure without knowing whether the device is&amp;nbsp;being managed. Another may confirm successful remediation without accounting for newly discovered or misclassified endpoints that still have access.&amp;nbsp;The result? No reliable way to trace risk from detection through deployment to actual exposure.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Consider this:&amp;nbsp;the&amp;nbsp;average organization manages only 60% of their edge devices, according to Ivanti's&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/borderless-security" target="_blank"&gt;Securing the Borderless Digital Landscape Report&lt;/a&gt;. That means 40% of potential entry points exist outside IT's view and outside their patch workflows. Security sees them.&amp;nbsp;IT&amp;nbsp;doesn't. That's&amp;nbsp;your&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/attack-surface-visibility-gaps"&gt;vulnerability gap&lt;/a&gt;.&amp;nbsp;Without that continuity, teams are forced to reconcile partial views manually. Data gets debated instead of&amp;nbsp;acted&amp;nbsp;on.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;img alt="graphic showing bar charts" src="https://static.ivanti.com/sites/marketing/media/images/blog/2026/04/02-unmanaged-edge-devices.png"&gt;&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Different data views lead to friction&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Imagine&amp;nbsp;it’s&amp;nbsp;Monday morning: Security discovers a critical zero-day in a widely used VPN client. They send an urgent alert to IT: "30,000 vulnerable endpoints detected — patch immediately."&amp;nbsp;&lt;/p&gt;

&lt;p&gt;IT checks their deployment console: &lt;em&gt;"VPN client already updated across 28,000 devices last Thursday."&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Both statements are true. Security is scanning the entire network — including contractor laptops, BYOD devices&amp;nbsp;and&amp;nbsp;systems that&amp;nbsp;briefly&amp;nbsp;connected to the VPN but&amp;nbsp;aren't&amp;nbsp;under IT management. IT patched everything in their device inventory.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Meanwhile, 2,000 genuinely vulnerable endpoints&amp;nbsp;remain&amp;nbsp;exposed because they exist in Security's view but not IT's.&amp;nbsp;The patch that should have taken 24 hours now requires three days of manual reconciliation.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;When IT and security&amp;nbsp;operate&amp;nbsp;from different data sources, misaligned&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/vulnerability-prioritization-guide"&gt;vulnerability management priorities&lt;/a&gt;&amp;nbsp;are inevitable.&amp;nbsp;Security teams focus on vulnerability counts, severity&amp;nbsp;scores&amp;nbsp;and&amp;nbsp;exploit intelligence. IT teams prioritize deployment success, system&amp;nbsp;stability&amp;nbsp;and&amp;nbsp;user impact. Both perspectives are necessary, but without a shared frame of reference, they pull in different directions.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;What follows&amp;nbsp;isn’t&amp;nbsp;just tension;&amp;nbsp;it’s&amp;nbsp;decision paralysis. Remediation slows while teams reconcile inventories,&amp;nbsp;validate&amp;nbsp;findings&amp;nbsp;and&amp;nbsp;argue about scope. Vulnerabilities&amp;nbsp;remain&amp;nbsp;open longer than they should, not because patches&amp;nbsp;aren’t&amp;nbsp;available, but because&amp;nbsp;there’s&amp;nbsp;no single view that connects detection,&amp;nbsp;deployment&amp;nbsp;and&amp;nbsp;exposure.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;The&amp;nbsp;risk of misaligned patching priorities&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Misalignment slows collaboration, but more so, it creates measurable risk that extends well beyond internal friction.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/26365754"&gt;&lt;/div&gt;

&lt;p&gt;Ivanti’s&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/aem" target="_blank"&gt;Autonomous Endpoint Management research&lt;/a&gt;&amp;nbsp;reflects this challenge in practice:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;38% of IT professionals report difficulty tracking patch status.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;35% struggle to meet remediation timelines due to incomplete endpoint visibility.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;When vulnerabilities&amp;nbsp;remain&amp;nbsp;open longer than necessary, the window of exposure grows. Attackers&amp;nbsp;don’t&amp;nbsp;wait.&amp;nbsp;The&amp;nbsp;&lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" rel="noopener" target="_blank"&gt;CISA KEV catalog&lt;/a&gt;&amp;nbsp;reveals the&amp;nbsp;difficult truth: 30% of vulnerabilities being actively exploited right now were originally&amp;nbsp;disclosed&amp;nbsp;more than five years ago.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;That's&amp;nbsp;not a patching problem;&amp;nbsp;it’s&amp;nbsp;a&amp;nbsp;visibility problem. Organizations&amp;nbsp;aren't&amp;nbsp;ignoring available patches;&amp;nbsp;they're&amp;nbsp;missing the endpoints that still need them.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Prolonged&amp;nbsp;exposure&amp;nbsp;windows and&amp;nbsp;breach&amp;nbsp;risk&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Fragmentation stretches&amp;nbsp;exposure&amp;nbsp;windows in subtle ways. Devices that were never enrolled in management platforms, such as shadow BYOD, unsecured contractor&amp;nbsp;devices&amp;nbsp;or&amp;nbsp;remote endpoints outside the traditional perimeter, often go unnoticed.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/resources/research-reports/borderless-security" target="_blank"&gt;Research from Ivanti&lt;/a&gt;&amp;nbsp;shows&amp;nbsp;that only one in three employers&amp;nbsp;have&amp;nbsp;implemented zero trust network access for remote workers, leaving significant gaps in visibility across distributed environments.&amp;nbsp;Newly discovered endpoints appear after patch reports are generated. Systems drift out of compliance between scan cycles. Each delay compounds the risk, extending the time attackers&amp;nbsp;have to&amp;nbsp;weaponize known weaknesses.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/24843673"&gt;&lt;/div&gt;

&lt;h2&gt;Common&amp;nbsp;post-patch&amp;nbsp;issues and IT&amp;nbsp;ticket&amp;nbsp;overload&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Even when patches are deployed on schedule, manual patching often creates downstream issues. Failed updates, broken agents, performance&amp;nbsp;problems&amp;nbsp;and&amp;nbsp;unexpected reboots trigger support tickets and emergency fixes. What starts as a security task quickly becomes an operational drain.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;IT teams spend time resolving predictable failures instead of&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/endpoint-management-ownership-it-security-governance"&gt;improving endpoint posture&lt;/a&gt;. Security teams see delays as unresolved risk. Users associate patching with disruption. That friction persists across teams, even when their goals are aligned.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Transforming&amp;nbsp;patch management&amp;nbsp;with autonomous endpoint management&amp;nbsp;&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;AI and automation address the core disconnects in&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/effective-modern-patch-management-processes-and-best-practices-for-patch-operations"&gt;patch management&lt;/a&gt;&amp;nbsp;by unifying visibility and reducing manual coordination. When endpoint discovery, vulnerability data, device&amp;nbsp;health&amp;nbsp;and&amp;nbsp;patch status are correlated into a unified view, IT and security teams can work from the same facts instead of reconciling partial data across tools.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/autonomous-endpoint-management"&gt;Autonomous endpoint management&amp;nbsp;(AEM)&lt;/a&gt; brings clarity to the confusion by using AI intelligence and automation to give IT and security a single, continuously updated view of endpoints, their&amp;nbsp;health&amp;nbsp;and their exposure.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;How&amp;nbsp;AI&amp;nbsp;improves patching decisions&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;AI improves patching decisions by prioritizing vulnerabilities based on real-world risk rather than severity scores alone. By factoring in exploit activity, asset criticality&amp;nbsp;and&amp;nbsp;exposure context, teams can align on what to patch first and focus effort where it will reduce risk fastest.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;With autonomous endpoint management, that same Monday morning scenario plays out differently:&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The vulnerability is detected, and AI&amp;nbsp;immediately&amp;nbsp;cross-references it against a unified endpoint inventory. It&amp;nbsp;identifies&amp;nbsp;1,560 devices running the vulnerable version, including 217 devices that were previously unmanaged.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/use-cases/automated-patch-management"&gt;Automated&amp;nbsp;patch&amp;nbsp;workflows&lt;/a&gt;&amp;nbsp;simultaneously: enroll the unmanaged devices, prioritize patching based on exposure risk and asset criticality. They then&amp;nbsp;schedule deployment during low-usage&amp;nbsp;windows, and&amp;nbsp;begin ring-based rollout.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;By the time the security team sends the alert, IT already has a real-time dashboard showing remediation in progress&amp;nbsp;—&amp;nbsp;with the same device count, the same exposure&amp;nbsp;data&amp;nbsp;and&amp;nbsp;the same prioritization logic. No reconciliation&amp;nbsp;necessary.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;How automation accelerates remediation&amp;nbsp;&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Automation then turns those decisions into action. Patch workflows can be orchestrated end to end:&amp;nbsp;identifying&amp;nbsp;affected devices, deploying&amp;nbsp;updates&amp;nbsp;and&amp;nbsp;validating&amp;nbsp;remediation without constant manual intervention.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;AI-powered intelligent patch scheduling minimizes user impact by aligning deployments with device usage patterns, maintenance&amp;nbsp;windows&amp;nbsp;and&amp;nbsp;operational constraints. Ring-based rollouts allow patches to be&amp;nbsp;validated&amp;nbsp;on smaller groups before wider deployment, reducing disruption while accelerating remediation. The result is faster&amp;nbsp;patching, less&amp;nbsp;downtime&amp;nbsp;and&amp;nbsp;a more predictable process for both teams.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Self-healing workflows detect and resolve common issues automatically, such as restarting services, reinstalling&amp;nbsp;agents&amp;nbsp;or&amp;nbsp;correcting misconfigurations. These workflows prevent avoidable incidents before they turn into support tickets.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;From data debates to unified intelligence and shared visibility&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/ivanti-neurons"&gt;AI-driven platforms&lt;/a&gt;&amp;nbsp;unify endpoint visibility by correlating discovery data, vulnerability context, device&amp;nbsp;health&amp;nbsp;and&amp;nbsp;patch status into a single endpoint record, with enrollment and access controls ensuring that devices are continuously discovered and managed throughout their lifecycle. IT and security teams see the same devices, the same&amp;nbsp;exposure&amp;nbsp;and&amp;nbsp;the same remediation status in real time.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This unified intelligence&amp;nbsp;eliminates&amp;nbsp;debates over whose data is correct and replaces them with agreement on which risks&amp;nbsp;to address&amp;nbsp;first.&amp;nbsp;By integrating remediation into broader endpoint workflows, teams reduce manual effort and&amp;nbsp;maintain&amp;nbsp;consistent patch outcomes at scale. By integrating remediation into broader endpoint workflows, teams reduce manual effort and&amp;nbsp;maintain&amp;nbsp;consistent patch outcomes at scale.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Shared patch ownership:&amp;nbsp;powering IT and security collaboration&amp;nbsp;&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;AI and automation only improve patch management when&amp;nbsp;they’re&amp;nbsp;paired with shared ownership. When IT and security teams&amp;nbsp;operate&amp;nbsp;from the same endpoint data and remediation workflows, accountability shifts from defending individual reports to jointly reducing exposure.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;A data-driven patch process starts with mutual goals. Instead of tracking success in isolated tools, organizations align IT and security around common metrics that reflect real-world risk and operational impact. This shared measurement creates clarity on priorities and removes ambiguity around ownership.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Effective collaboration depends on metrics both teams trust and act on together. Common KPIs include:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Mean Time to Remediate (MTTR):&amp;nbsp;How quickly critical vulnerabilities are resolved&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Patch compliance rates:&amp;nbsp;Across both managed and previously unmanaged endpoints&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Exposure duration:&amp;nbsp;How long high-risk vulnerabilities&amp;nbsp;remain&amp;nbsp;open&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Endpoint visibility:&amp;nbsp;Percentage of devices fully discovered and managed&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These metrics shift conversations from patch volume to measured risk outcomes and help teams focus on outcomes instead of activity.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Joint ownership requires workflows that span the entire&amp;nbsp;patch&amp;nbsp;lifecycle. AI-driven platforms support this by automating routine tasks while surfacing exceptions that require human judgment.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;IT and security leaders define guardrails for automation, including&amp;nbsp;approval&amp;nbsp;thresholds, testing&amp;nbsp;requirements&amp;nbsp;and&amp;nbsp;rollout constraints. Within those boundaries, automation executes remediation consistently and at scale, without constant manual coordination. Over time, trust in the process grows, coordination overhead decreases, and patching becomes a cooperative operational responsibility rather than a point of friction.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Visit our solutions page to discover how&amp;nbsp;&lt;a href="https://www.ivanti.com/autonomous-endpoint-management"&gt;Ivanti's autonomous endpoint management solutions&lt;/a&gt;&amp;nbsp;give IT and security teams the unified visibility they need to&amp;nbsp;eliminate&amp;nbsp;patching silos and close vulnerabilities faster.&amp;nbsp;&lt;/p&gt;
</description><pubDate>Thu, 02 Apr 2026 15:37:11 Z</pubDate></item><item><guid isPermaLink="false">4438f929-aa59-4aee-a8d8-d16555dab909</guid><link>https://www.ivanti.com/blog/march-2026-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><category>Patch Management</category><title>March 2026 Patch Tuesday</title><description>&lt;p&gt;March Patch Tuesday resolves 79 CVEs, of which three are Critical and 76 are Important. There are two publicly disclosed CVEs this month, but none exploited. Microsoft has also released an Edge update resolving nine Chrome CVEs. The public disclosures include a Denial-of-Service vulnerability in .Net and an Elevation of Privilege vulnerability in SQL Server. Both disclosures are listed as Unproven for Exploit Code Maturity indicating the disclosures did not include any code samples.&lt;/p&gt;

&lt;p&gt;Adobe and Mozilla have released updates as part of the March Patch Tuesday including eight updates from Adobe resolving a total of 80 CVEs, 21 of which are rated Critical. Mozilla Firefox 148.0.2 released resolving three high severity CVEs.&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerability&lt;/h2&gt;

&lt;p&gt;Microsoft resolved an&amp;nbsp;Elevation of Privilege vulnerability in SQL Server (CVE-2026-21262). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 8.8, but&amp;nbsp;it&amp;nbsp;has been publicly disclosed. An attacker who successfully exploited this vulnerability could gain SAL sysadmin privileges. The vulnerability affects SQL Server 2016 and later editions.&lt;/p&gt;

&lt;p&gt;Microsoft resolved an&amp;nbsp;Denial of Service vulnerability in .NET (CVE-2026-26127). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.5, but&amp;nbsp;it&amp;nbsp;has been publicly disclosed. An attacker could cause an out-of-bounds read in .NET allowing an unauthorized attacker to deny service over a network. The vulnerability affects .NET 9 and 10 on Windows, Mac OS and Linux as well as NuGet 9 and 10 packages.&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities&lt;/h2&gt;

&lt;p&gt;Adobe has released eight updates this month resolving a total of 80 CVEs, 21 of which are rated Critical. Adobe Commerce is the highest priority this month with a Priority 2 rating. Other affected products include Adobe Illustrator, Substance 3D Painter, Acrobat and Acrobat Reader, Premier Pro, Experience Manager, Substance 3D Stager, and DNG SDK.&lt;/p&gt;

&lt;p&gt;Mozilla has released an update for Firefox 148.0.2 resolving three High severity vulnerabilities.&lt;/p&gt;

&lt;h2&gt;March update to-do list&lt;/h2&gt;

&lt;p&gt;The Microsoft OS and Office updates will resolve the majority of the CVEs resolved this month in two easy updates.&lt;/p&gt;

&lt;p&gt;Mozilla Firefox, Microsoft Edge and Google Chrome are all released frequently. Prioritize browser updates on a weekly or daily basis to reduce risks continuously with minimal risk of impact.&lt;/p&gt;
</description><pubDate>Tue, 10 Mar 2026 21:01:35 Z</pubDate></item><item><guid isPermaLink="false">613c7534-d87d-411a-8d02-57955ea3c5e1</guid><link>https://www.ivanti.com/blog/february-2026-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Patch Management</category><category>Security</category><title>February 2026 Patch Tuesday</title><description>&lt;p&gt;February Patch Tuesday includes recent out-of-band updates from Microsoft between January 17th and 29th, including multiple bug fixes and a fix for a zero-day exploit in Microsoft Office. In addition, Microsoft announced the phased disablement of NTLM precede the February 2026 Patch Tuesday release.&lt;/p&gt;

&lt;p&gt;For the February Patch Tuesday release, Microsoft has resolved 57 unique CVEs. Six CVEs are flagged as Exploited and three of those are Publicly Disclosed as well. Add the out-of-band (OOB) zero-day and you have a lineup of CVEs that need some attention.&lt;/p&gt;

&lt;h2&gt;January Out-of-Band Releases&lt;/h2&gt;

&lt;p&gt;The first OOB release on January 17th resolved a credential prompt failure when attempting remote desktop or remote appliance connections. The second round of OOB updates occurred on January 24th and 26th resolving application crashes in Outlook and OneDrive, and system hibernation/shut down issues. And finally, the third OOB update on January 26th was a zero-day vulnerability &amp;nbsp;CVE-&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509" rel="noopener" target="_blank"&gt;2026-21509&lt;/a&gt;, a Microsoft Office Security Feature bypass vulnerability.&lt;/p&gt;

&lt;h2&gt;Microsoft plans phased NTLM disablement&lt;/h2&gt;

&lt;p&gt;Microsoft released their plan for the&amp;nbsp;&lt;a href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/advancing-windows-security-disabling-ntlm-by-default/4489526" rel="noopener" target="_blank"&gt;phased disablement&lt;/a&gt;&amp;nbsp;of New Technology LAN Manager (NTLM) in the latest operating systems starting now in 2026 and beyond. The NTLM authentication protocol was introduced back in 1993 and has since been superseded by Kerberos protocols, which are far more secure. However, NTLM has remained the fallback when Kerberos is unavailable despite being deprecated and having weak algorithms.&lt;/p&gt;

&lt;p&gt;Phase one introduces additional auditing to help identify where NTLM may still be running and&amp;nbsp;&lt;a href="https://techcommunity.microsoft.com/blog/coreinfrastructureandsecurityblog/active-directory-hardening-series---part-8-%E2%80%93-disabling-ntlm/4485782" rel="noopener" target="_blank"&gt;changing it out&lt;/a&gt;&amp;nbsp;where you can. Starting now, Microsoft recommends using&amp;nbsp;&lt;a href="https://support.microsoft.com/en-us/topic/overview-of-ntlm-auditing-enhancements-in-windows-11-version-24h2-and-windows-server-2025-b7ead732-6fc5-46a3-a943-27a4571d9e7b" rel="noopener" target="_blank"&gt;advanced NTLM auditing&lt;/a&gt;&amp;nbsp;already available in Server 2025, and Windows 11 24H2 and newer. Phase two begins with major OS updates coming later this year. This update will address the ‘pain points’ or blockers by removing multiple fallback scenarios where Kerberos reverts back to NTLM.&lt;/p&gt;

&lt;p&gt;And finally in phase three, NTLM will be disabled by default. The code will still be there, but you will need to explicitly re-enable it if absolutely needed. This three-phase approach will happen quickly, so plan appropriately to replace NTLM in your environment and take a giant security step forward. The ‘NTLM disabled by default’ phase will occur with the next major Server update.&lt;/p&gt;

&lt;h2&gt;Microsoft’s exploited vulnerability &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;On January 29th, Microsoft resolved a&amp;nbsp;Security Feature Bypass vulnerability in Microsoft Office (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509" rel="noopener" target="_blank"&gt;CVE-2026-21509&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.8, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. An attacker can send a user a malicious Office file and convince them to open the file to exploit the vulnerability. A risk-based prioritization&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft resolved an&amp;nbsp;Elevation of Privilege vulnerability in Remote Desktop Services (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21533" rel="noopener" target="_blank"&gt;CVE-2026-21533&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.8, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. The vulnerability affects Windows 10 and later editions of the OS. A risk-based prioritization&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft resolved an&amp;nbsp;Elevation of Privilege vulnerability in Desktop Window Manager (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21519" rel="noopener" target="_blank"&gt;CVE-2026-21519&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.8, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. The vulnerability affects all currently supported and ESU supported versions of Windows OS. A risk-based prioritization&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft resolved a&amp;nbsp;Security Feature Bypass vulnerability in MSHTML Framework (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21513" rel="noopener" target="_blank"&gt;CVE-2026-21513&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 8.8, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. An attacker who successfully exploited this vulnerability could bypass a security feature over a network. The vulnerability affects Windows 10 and later editions of the OS. A risk-based prioritization&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft resolved a&amp;nbsp;Security Feature Bypass vulnerability in Windows Shell (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21510" rel="noopener" target="_blank"&gt;CVE-2026-21510&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 8.8, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. An attacker who successfully exploited this vulnerability could bypass a security feature over a network. The vulnerability affects all currently supported and ESU supported versions of Windows OS. A risk-based prioritization&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft resolved an&amp;nbsp;Security Feature Bypass vulnerability in Microsoft Word (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21514" rel="noopener" target="_blank"&gt;CVE-2026-21514&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.8, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. An attacker can bypass a security feature locally due to a reliance on untrusted inputs. A risk-based prioritization&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft resolved a&amp;nbsp;Denial of Service vulnerability in Windows Remote Access Connection Manager (CVE-2026-21525). The vulnerability is rated Moderate by Microsoft and has a CVSS v3.1 score of 6.2, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. A null pointer dereference in Windows Remote Access Connection Manager allows an unauthorized attacker to deny service locally. The vulnerability affects all currently supported and ESU supported versions of Windows OS. A risk-based prioritization&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Ivanti security advisories &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Ivanti has released one security update for February. The update affects Ivanti Endpoint Manager and resolves two new CVEs and 11 medium severity CVEs that were disclosed in late 2025. More details and information about mitigations can be found in the&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/february-2026-security-update"&gt;February Security Advisory&lt;/a&gt;.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In addition, there was a security advisory on January 29th for Ivanti Endpoint Manager Mobile (EPMM) that had a limited number of customers impacted at time of disclosure. Ivanti urges all customers using the on-prem EPMM product to promptly install the Security Update. The security advisory, additional technical analysis, and an Exploitation Detection script co-developed with NCSC-NL can be found in the &lt;a href="https://www.ivanti.com/blog/january-2026-epmm-security-update"&gt;January Security Advisory&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities  &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Adobe has released nine updates this month resolving 43 CVEs, 27 of which are Critical. All nine updates are rated Priority three by Adobe.&lt;/p&gt;

&lt;h2&gt;February update to-do list&lt;/h2&gt;

&lt;p&gt;Windows OS and Microsoft Office updates are priority this month resolving six new and one OOB zero-day exploits.&lt;/p&gt;

&lt;p&gt;Review Microsoft&amp;nbsp;&lt;a href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/advancing-windows-security-disabling-ntlm-by-default/4489526" rel="noopener" target="_blank"&gt;phased disablement&lt;/a&gt; of NTLM announcement and documentation to start planning for the deprecation and disablement of NTLM.&lt;/p&gt;
</description><pubDate>Tue, 10 Feb 2026 21:58:44 Z</pubDate></item><item><guid isPermaLink="false">7bbd54ed-d35c-4e94-b814-6920a467a5e7</guid><link>https://www.ivanti.com/blog/january-2026-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Patch Management</category><category>Security</category><title>January 2026 Patch Tuesday</title><description>&lt;p&gt;New year,&amp;nbsp;new updates!&amp;nbsp;Welcome back to the Ivanti Patch Tuesday blog where we&amp;nbsp;provide&amp;nbsp;you&amp;nbsp;critical insights to&amp;nbsp;optimize&amp;nbsp;your exposure management activities.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This month there are a pair of Mozilla CVEs that are suspected&amp;nbsp;of being&amp;nbsp;exploited and a Microsoft CVE that has been exploited.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In addition, Microsoft has a pair of&amp;nbsp;publicly disclosed vulnerabilities that will need to be reviewed to see if your organization may be&amp;nbsp;impacted&amp;nbsp;by the changes Microsoft is making.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;There are&amp;nbsp;additional&amp;nbsp;third-party&amp;nbsp;updates&amp;nbsp;from Adobe,&amp;nbsp;and&amp;nbsp;you should&amp;nbsp;expect more from Google and Oracle over the next few days and into next week&amp;nbsp;that should be included in your monthly maintenance.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;A side note of good news:&amp;nbsp;Microsoft has broken the Server 2025&amp;nbsp;update out&amp;nbsp;into a separate KB,&amp;nbsp;so it is only&amp;nbsp;1.9GB in size,&amp;nbsp;versus this month’s&amp;nbsp;4GB+ Windows 11 cumulative update.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Microsoft’s exploited vulnerability &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved an&amp;nbsp;Information Disclosure vulnerability in Desktop Window Manager (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20805" rel="noopener" target="_blank"&gt;CVE-2026-20805&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 5.5, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. The exposure could be used to&amp;nbsp;disclose&amp;nbsp;a section address from a remote ALPC port&amp;nbsp;that&amp;nbsp;is user-mode memory. The vulnerability affects all currently supported and extended security update-supported versions of the Windows OS. A risk-based prioritization&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved a&amp;nbsp;Security Feature Bypass vulnerability in Secure Boot Certification Expiration&amp;nbsp;(&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21265" rel="noopener" target="_blank"&gt;CVE-2026-21265&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of&amp;nbsp;6.4,&amp;nbsp;but&amp;nbsp;it&amp;nbsp;has been publicly&amp;nbsp;disclosed.&amp;nbsp;In&amp;nbsp;addition&amp;nbsp;the update, the&amp;nbsp;fix&amp;nbsp;provides a warning&amp;nbsp;regarding&amp;nbsp;certificates that will be expiring in 2026&amp;nbsp;and details on actions that are&amp;nbsp;required&amp;nbsp;to up&amp;nbsp;renew&amp;nbsp;certificates&amp;nbsp;prior to their&amp;nbsp;expiration.&amp;nbsp;It is recommended to start investigating what actions your organization may need to take to prevent potential serviceability and security as certificates expire.&amp;nbsp;  &amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft is addressing&amp;nbsp;an&amp;nbsp;Elevation of Privilege vulnerability in Windows Agere Soft Modem Driver (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-31096" rel="noopener" target="_blank"&gt;CVE-2023-31096&lt;/a&gt;). The vulnerability CVE ID was assigned by MITRE&amp;nbsp;in 2023. It&amp;nbsp;is rated Important and has a CVSS v3.1 score of 7.8.&amp;nbsp;The CVE has been publicly&amp;nbsp;disclosed. Microsoft’s resolution is to remove the affected drivers from the Windows OS as&amp;nbsp;of the January 2026 cumulative update. Microsoft recommends removing any existing dependencies on this hardware.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Ivanti security advisories &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Ivanti has released no security advisories this month.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities  &amp;nbsp;&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://www.mozilla.org/en-US/security/advisories/" rel="noopener" target="_blank"&gt;Mozilla has released updates for Firefox and Firefox ESR,&amp;nbsp;resolving a total of&amp;nbsp;34&amp;nbsp;CVEs&lt;/a&gt;. All three updates have an Impact rating of High. Two CVEs are suspected to be exploited (CVE-2026-0891 and CVE-2026-0892). Both are resolved in Firefox 147 (&lt;a href="https://www.mozilla.org/en-US/security/advisories/mfsa2026-01/" rel="noopener" target="_blank"&gt;MFSA2026-01&lt;/a&gt;),&amp;nbsp;and CVE-2026-0891 is resolved in Firefox ESR 140.7 (&lt;a href="https://www.mozilla.org/en-US/security/advisories/mfsa2026-03/" rel="noopener" target="_blank"&gt;MFSA2026-03&lt;/a&gt;).&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Expect Google Chrome and Microsoft Edge updates this week in addition to a high-severity vulnerability in Chrome WebView that was resolved in the January 6 Chrome update (CVE-2026-0628).&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Adobe&amp;nbsp;has released 11 updates this month affecting&amp;nbsp;DreamWeaver, InDesign,&amp;nbsp;Illustrator, InCopy, Bridge, Substance 3D Modeler, Stager, Painter,&amp;nbsp;Sampler&amp;nbsp;and Designer and&amp;nbsp;Coldfusion.&amp;nbsp;Coldfusion&amp;nbsp;is a priority 1. Everything else is priority 3, but most of the updates include Critical CVEs.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Oracle’s Quarterly CPU is scheduled to&amp;nbsp;release&amp;nbsp;on January 20, so be prepared for updates for Oracle solutions, including Java. Once the Java release is out,&amp;nbsp;expect&amp;nbsp;all of&amp;nbsp;the Java-based frameworks to update over the next few weeks.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;January update&amp;nbsp;to-do&amp;nbsp;list&amp;nbsp;&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Browser updates are a priority this month. Mozilla resolved two suspected zero-day exploits (CVE-2026-0891 and CVE-2026-0892),&amp;nbsp;and Chrome resolved a high-severity CVE (CVE-2026-0628).&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;The Windows OS update resolves one exploited and two publicly disclosed vulnerabilities this month,&amp;nbsp;putting the Windows OS update as top priority this month&amp;nbsp;alongside&amp;nbsp;the browser updates.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Review Secure Boot Certificate timelines and usage of Agere Soft Modem drivers&amp;nbsp;to avoid serviceability and security issues.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 13 Jan 2026 21:52:53 Z</pubDate></item><item><guid isPermaLink="false">fc33ed2b-c5b5-40e8-9203-f0e06e986278</guid><link>https://www.ivanti.com/blog/dll-hijacking-prevention</link><atom:author><atom:name>Mariah Shotts</atom:name><atom:uri>https://www.ivanti.com/blog/authors/mariah-shotts</atom:uri></atom:author><category>Endpoint Management</category><category>Patch Management</category><category>Security</category><title>DLL Hijacking: Risks, Real-World Examples and How to Prevent Attacks</title><description>&lt;p&gt;There’s been buzz around &lt;a href="https://www.cve.org/CVERecord?id=CVE-2025-56383" rel="noopener" target="_blank"&gt;CVE-2025-56383&lt;/a&gt; (published on Sept. 26, 2025), a hijacking vulnerability in Notepad++ v8.8.3 in which a DLL file can be swapped to execute malicious code.&lt;/p&gt;

&lt;p&gt;The CVE has been disputed by multiple parties, but we’re not here to comment on that. However, we are here to comment on DLL hijacking and discuss the very real threat that it poses to an organization. Let’s look into what DLL hijacking is and what measures you can take to keep your DLLs safe.&lt;/p&gt;

&lt;h2&gt;What DLL hijacking is and how it happens&lt;/h2&gt;

&lt;p&gt;DLL hijacking (also known as a DLL preloading attack) is a security vulnerability where a legitimate and trusted Dynamic Link Library (DLL) file in a Windows application is replaced with a malicious one.&lt;/p&gt;

&lt;p&gt;This method exploits the way applications load DLL files, which contain code and data used by multiple programs. By loading a malicious DLL, a threat actor can execute their own code with the same privileges as the legitimate application, leading to privilege escalation, persistence and defense evasion.&lt;/p&gt;

&lt;p&gt;When a program starts, it often needs to load various DLLs to perform specific functions, typically from trusted system directories. However, if an application is not careful about where it looks for these DLLs, it might load a malicious DLL from an insecure or predictable location (i.e., the current working directory or a network share). This can happen if the application does not specify the full path to the DLL or if it searches for the DLL in a directory that can be accessed or modified by an attacker.&lt;/p&gt;

&lt;p&gt;&lt;img alt="Flowchart showing DLL loading sequence. A purple box labeled “Application starts and requests DLL” connects to three folders: “Current Working Directory,” “Network Share,” and “System32.” The Current Working Directory points to a red box labeled “Malicious DLL” with a warning icon, while Network Share and System32 point to orange boxes labeled “Legitimate DLL” with checkmark icons." src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/12/diagram1-dll-hijackcing.png"&gt;&lt;/p&gt;

&lt;p&gt;While this type of attack is not new, it remains effective due to its simplicity. And although this specific issue pertains to Windows applications, it's important to call out that similar vulnerabilities can affect other operating systems (like Linux and macOS, which use dynamic loading for shared libraries).&lt;/p&gt;

&lt;p&gt;DLL hijacking introduces multiple security risks, including:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Data theft:&lt;/strong&gt; The malicious DLL can intercept and steal sensitive data, such as passwords or personal information.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Compromised systems:&lt;/strong&gt; The attacker can gain control over the system, potentially leading to further attacks or the installation of additional malware.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Malware:&lt;/strong&gt; The malicious DLL can act as a conduit for spreading malware, infecting other parts of the system or network.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;A DLL can be hijacked in several different ways; here are some of the most common techniques:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Insecure DLL search order:&lt;/strong&gt; Attackers place malicious DLLs in directories searched before the legitimate DLL's location.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Relative path manipulation:&lt;/strong&gt; Malicious DLLs are loaded when applications use relative paths.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;DLL redirection:&lt;/strong&gt; Techniques like path manipulation redirect the DLL loading process.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Weak permissions:&lt;/strong&gt; Attackers replace legitimate DLLs with malicious ones in directories with weak permissions.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Phantom DLL hijacking:&lt;/strong&gt; Attackers exploit applications loading non-existent DLLs by placing malicious DLLs with the same name in searched directories.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;img alt="Circular diagram divided into six colored segments around a center labeled “DLL Hijacking Techniques.” Segments include “Phantom DLL Hijacking,” “Insecure DLL Search Order,” “Relative Path Manipulation,” “DLL Redirection,” “Weak Permissions,” each with a small icon representing the concept." src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/12/diagram2-dll-hijackcing.png"&gt;These potential vulnerabilities highlight the importance of secure coding practices and directory permission management when it comes to preventing this form of attack.&lt;/p&gt;

&lt;h2&gt;How to prevent DLL hijacking and keep your DLLs safe and secure&lt;/h2&gt;

&lt;p&gt;Although DLL hijacking remains a threat, there are best practices you can follow and implement to reduce your risk for a safer, more secure IT environment.&lt;/p&gt;

&lt;p&gt;&lt;img alt="Five concentric circles in gradient colors from orange to purple, representing security layers. The innermost circle reads “Secure DLL Loading,” followed by “Integrity Checks,” “User Permissions,” “App Control and Security Software,” and the outermost circle labeled “Patch Management.”" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/12/diagram3-dll-hijackcing.png"&gt;&lt;/p&gt;

&lt;h3&gt;Secure DLL loading:&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Use full paths:&lt;/strong&gt; Always specify the full path to the DLL when loading it. This ensures that the application loads the DLL from a trusted location (and not from an insecure directory).&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Set the safe search path:&lt;/strong&gt; Use the SetDllDirectory function in Windows to add trusted directories to the search path and exclude insecure ones. This can help prevent the application from loading DLLs from unexpected locations.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;File integrity checks:&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Digital signatures:&lt;/strong&gt; Ensure that DLLs are signed with a digital signature and verify the signature before loading the DLL. This can help confirm that the DLL has not been tampered with.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Hash verification:&lt;/strong&gt; Use cryptographic hash functions to verify the integrity of DLL files. If the hash of the DLL does not match the expected value, the file may have been modified.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;User permissions:&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Least privilege principle:&lt;/strong&gt; Run applications with the least privilege necessary. This limits the potential damage of a DLL hijacking, as the malicious code will have fewer permissions to execute harmful actions.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;User Account Control (UAC):&lt;/strong&gt; Enable UAC on Windows systems to prompt users for permission before running applications with elevated privileges. This can help prevent unauthorized changes to system files.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Application control and privilege management:&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Known and trusted applications:&lt;/strong&gt; Application control ensures that only known and trusted applications are launchable, removing the risk of unauthorized applications being introduced.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Privilege control:&lt;/strong&gt; Effective privilege management is crucial in preventing DLL hijacking. By ensuring that applications have the correct rights and privileges to launch, you limit the ability of unauthorized users to introduce malicious files. This control acts as a key barrier, restricting the access an attacker needs to exploit the DLL search mechanism and thereby enhancing the security of your environment.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Security software:&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Antivirus and anti-Malware:&lt;/strong&gt; Use reputable antivirus and anti-malware software to detect and prevent the loading of malicious DLLs. These tools can scan for known malicious files and behaviors.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Intrusion Detection Systems (IDS):&lt;/strong&gt; Implement IDS to monitor for unusual activity, such as unexpected changes to DLL files or attempts to load DLLs from insecure locations.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Patch management:&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Keep software updated:&lt;/strong&gt; Regularly update applications and operating systems with the latest security patches. Many DLL hijacking vulnerabilities are fixed via updates, so stay current to help protect against known threats.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Automated patching:&lt;/strong&gt; Use an &lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-patch-management"&gt;automated patch management tool&lt;/a&gt; to ensure that all systems are kept up to date without manual intervention. This reduces the window of opportunity for attackers to exploit known vulnerabilities, including those that could be used for DLL hijacking. This proactive approach helps maintain the integrity of your applications and operating systems, making it much harder for attackers to inject malicious DLLs.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;By implementing these best practices, you can significantly reduce the risk of DLL hijacking and enhance the overall security of your applications and systems.&lt;/p&gt;

&lt;h2&gt;Combine the right tools and tactics to prevent DLL hijackings&lt;/h2&gt;

&lt;p&gt;DLL hijacking has been a persistent form of attack for years, proving that it’s still effective and will therefore continue to be an issue for organizations.&lt;/p&gt;

&lt;p&gt;Future-proof your organization using the best practices mentioned above combined with proven solutions like &lt;a href="https://www.ivanti.com/products/application-control"&gt;Ivanti Neurons for App Control&lt;/a&gt; to help keep your DLLs secure. Capabilities like Trusted Ownership catch and deny a hijacked DLL from being executed by ensuring that ownership of the items matches your approved list of trusted owners.&lt;/p&gt;

&lt;p&gt;And, keep your apps up to date to limit exposure to known vulnerabilities. Remove the risk of human error by automating patching with &lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-patch-management"&gt;Ivanti Neurons for Patch Management&lt;/a&gt;, ensuring that systems are automatically updated and secured.&lt;/p&gt;
</description><pubDate>Wed, 17 Dec 2025 14:00:02 Z</pubDate></item><item><guid isPermaLink="false">f6313797-d456-4178-8477-933be69ec3b9</guid><link>https://www.ivanti.com/blog/december-2025-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Patch Management</category><category>Security</category><title>December 2025 Patch Tuesday</title><description>&lt;p&gt;Here we are at the final Patch Tuesday for 2025. Microsoft has resolved 56 CVEs (two Critical and 54 Important). Included in this release is one known exploited (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62221" rel="noopener" target="_blank"&gt;CVE-2025-62221&lt;/a&gt;) and two publicly disclosed CVEs (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54100" rel="noopener" target="_blank"&gt;CVE-2025-54100&lt;/a&gt; and &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64671" rel="noopener" target="_blank"&gt;CVE-2025-64671&lt;/a&gt;). This month’s OS update resolves the exploit (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62221" rel="noopener" target="_blank"&gt;CVE-2025-62221&lt;/a&gt;) and one of the public disclosures (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54100" rel="noopener" target="_blank"&gt;CVE-2025-54100&lt;/a&gt;), making the Windows OS a top priority this month. The other public disclosure is in GitHub Copilot for Jetbrains (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64671" rel="noopener" target="_blank"&gt;CVE-2025-64671&lt;/a&gt;), which would require developers to download and update the GitHub Copilot plugin.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Third-party updates this Patch Tuesday include multiple releases from Mozilla for Firefox 146 and Firefox ESR 115.31 and 140.6. Adobe released five updates to resolve 142 CVEs including an update for Adobe Acrobat and Reader. Four of five updates are rated as Priority Three, but the Adobe ColdFusion update is rated Priority One. There are no known exploits, but the ColdFusion update resolves the bulk of the CVEs resolved by Adobe this month.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Microsoft’s exploited vulnerability&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Cloud Files Mini Filter Driver (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62221" rel="noopener" target="_blank"&gt;CVE-2025-62221&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.8 but is confirmed to be exploited in the wild. An attacker who successfully exploits this CVE could gain SYSTEM privileges. The CVE affects Windows 10 and later Windows editions. A risk-based prioritization approach would prioritize this CVE as Critical.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved a Remote Code Execution vulnerability in PowerShell (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54100" rel="noopener" target="_blank"&gt;CVE-2025-54100&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.8 but has been publicly disclosed. The fix provides a warning and guidance to avoid the potential remote code execution, but the nature of the exposure makes it improbable to fully remediate. The Invoke-WebRequest command can parse the contents of a web page and could potentially run script code in the web page when it is parsed. A warning is presented recommending the use of the -UseBasicParsing switch to avoid script code execution. The CVE affects Server 2008 and later Windows editions.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft has resolved a Remote Code Execution vulnerability in GitHub Copilot for Jetbrains (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64671" rel="noopener" target="_blank"&gt;CVE-2025-64671&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 8.4 but has been publicly disclosed. An attacker could exploit code using a malicious Cross Prompt Inject in untrusted files or MCP servers, allowing the execution of additional commands by appending them to commands allowed in the user’s terminal auto-approve setting.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Ivanti security advisories&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Ivanti has released one security update this month. The update affects Ivanti Endpoint Manager and resolves four vulnerabilities. More details and information about mitigations can be found in the &lt;a href="https://www.ivanti.com/blog/december-2025-security-update"&gt;December Security Advisory&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Mozilla has released updates for Firefox and Firefox ESR resolving a total of 27 CVEs. All three updates have an Impact rating of High.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Adobe released five updates this month affecting ColdFusion, Experience Manager, DNG SDK, Acrobat and Reader and Creative Cloud Desktop. ColdFusion is a Priority One and resolves the majority of the 142 CVEs. The other four updates are rated Priority Three.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;December update priorities&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;The Windows OS update is the priority this month to resolve &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62221" rel="noopener" target="_blank"&gt;CVE-2025-62221&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;All other updates can be resolved under normal SLA priorities.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
</description><pubDate>Tue, 09 Dec 2025 22:05:21 Z</pubDate></item><item><guid isPermaLink="false">7110e1c4-6550-4404-9c43-44e911ea4946</guid><link>https://www.ivanti.com/blog/november-2025-patch-tuesday</link><category>Patch Tuesday</category><category>Patch Management</category><category>Security</category><title>November 2025 Patch Tuesday</title><description>&lt;p&gt;November Patch Tuesday is the first Patch Tuesday after the EoL of Windows 10. In the shadow of Windows 10, there are a number of other product EoLs of note. Exchange Server, for one, is getting some additional attention. &lt;a href="https://techcommunity.microsoft.com/blog/exchange/announcing-exchange-2016--2019-extended-security-update-program/4433495" rel="noopener" target="_blank"&gt;Microsoft announced a 6-month ESU option for Exchange 2016/2019 servers&lt;/a&gt; for customers who need the extension. Their guidance, however, is not to rely on this program and to make every attempt to move off of Exchange and move to Exchange SE in time. Cybersecurity agencies across the globe have also collaborated to provide a &lt;a href="https://techcommunity.microsoft.com/blog/exchange/announcing-exchange-2016--2019-extended-security-update-program/4433495" rel="noopener" target="_blank"&gt;Security Best Practices guide for Microsoft Exchange Server&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Microsoft resolved 63 unique vulnerabilities this month, including one known exploited CVE (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62215" rel="noopener" target="_blank"&gt;CVE-2025-62215&lt;/a&gt;). The exploited CVE is an Elevation of Privilege vulnerability in the Windows Kernel that can allow an attacker to gain SYSTEM-level privileges on the target system. Affected products this month include Windows OS, Office, SharePoint, SQL Server, Visual Studio, GitHub Copilot and Azure Monitor Agent.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;For third-party updates, Oracle released their quarterly &lt;a href="https://www.oracle.com/security-alerts/cpuoct2025.html" rel="noopener" target="_blank"&gt;Critical Patch Update&lt;/a&gt; on October 21, 2025. This included many updates including Java. With the release of Java comes a stream of Java framework updates, including RedHat OpenJDK, Amazon Corretto, Azul Zulu, Eclipse Adoptium, Adopt OpenJDK and others.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Patch Tuesday third-party updates include eight from Adobe and three from Mozilla, and Google Chrome released a stability and performance update this month (no CVEs reported).&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Microsoft’s exploited vulnerability&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62215" rel="noopener" target="_blank"&gt;CVE-2025-62215&lt;/a&gt;), which Microsoft has confirmed is exploited in the wild. The CVE is rated Important and has a CVSS 3.1 score of 7.0. The vulnerability requires an attacker to win a race condition, but if exploited it would allow the attacker to gain SYSTEM privileges on the affected system. The vulnerability affects all currently supported Windows OS editions and Windows 10 ESU, which means the risk of running Windows 10 past the EoL without ESU is not hypothetical. Ensure you are subscribing to Windows 10 ESU and providing additional mitigations where possible.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Ivanti security advisories&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Ivanti has released one Security Advisory for November Patch Tuesday, resolving three CVEs. The security advisory for Ivanti Endpoint Manager provides details on vulnerable versions. Also, the advisory reminds Ivanti Endpoint Manager customers that version 2022 reached End of Life at the end of October 2025. All Ivanti EPM customers are urged to upgrade to 2024 SU4 to remediate the three vulnerabilities.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;For more details, you can view the updates and information provided in the &lt;a href="https://www.ivanti.com/blog/november-2025-security-update"&gt;November Security Updat&lt;/a&gt;e on the Ivanti blog.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities&amp;nbsp;&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Adobe released eight updates resolving 28 CVEs. All eight updates are rated priority three.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Mozilla released three updates resolving a total of 29 CVEs.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Google Chrome just released a stability and performance update, but it has resolved 27 CVEs since October Patch Tuesday.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;November update priorities&amp;nbsp;&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;The Windows OS is the highest priority this month, with one zero-day exploit.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Continue to monitor your environment for EoL software. Beyond Windows 10 EoL, there are editions of Office that are now EoL along with Exchange. The first month after the Windows 10 EoL has a zero-day that affects the Windows 10 OS. The risks of continuing to run EoL software without extended support are very real, and threat actors will be looking to take advantage.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 11 Nov 2025 20:26:09 Z</pubDate></item><item><guid isPermaLink="false">77e51b29-a602-4d2a-92ee-011a73cea9bd</guid><link>https://www.ivanti.com/blog/unpatchable-vulnerabilities-risk-mitigation-strategies</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Management</category><title>Unpatchable Vulnerabilities: Key Risk Mitigation Strategies</title><description>&lt;p&gt;Wouldn’t it be great if every vulnerability had a fix waiting in the wings? If patching were always fast, easy, and complete?&amp;nbsp;&lt;/p&gt;

&lt;p&gt;That’s not the world we live in.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Some vulnerabilities can’t be patched at all. Others are buried in systems or services you don’t fully control. And the longer your focus stays limited to internal infrastructure, the more risk slips through the cracks.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This is where the conversation broadens, from vulnerability management to full spectrum &lt;a href="https://www.ivanti.com/glossary/exposure-management"&gt;exposure management&lt;/a&gt;. Because unpatchable vulnerabilities aren’t edge cases. They're part of your everyday risk landscape and deserve a seat at every CISO’s table.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The problem? Too many organizations still equate vulnerability management with patching, and that mindset creates blind spots big enough for attackers to walk right through. It ignores the exposures lurking outside traditional infrastructure: Cloud misconfigs, expired certs, &lt;a href="https://www.ivanti.com/blog/software-supply-chain-attack-risk"&gt;third-party software dependencies&lt;/a&gt;, identity abuse and more.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;What are unpatchable vulnerabilities?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Unpatchable vulnerabilities live up to their name. They’re flaws you can’t fix with a vendor patch, and not as rare as you might think. In today’s environment, risk is as likely to come from a cloud misconfiguration or expired certificate as it is from a missing update. But if your strategy focuses only on infrastructure vulnerabilities, you’re leaving massive gaps in your defenses.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Most teams lack total &lt;a href="https://www.ivanti.com/blog/attack-surface-visibility-gaps"&gt;attack surface visibility&lt;/a&gt; and treat infrastructure as the entire &lt;a href="https://www.ivanti.com/glossary/attack-surface"&gt;attack surface&lt;/a&gt;. Full stop. But that’s only one layer in a much broader landscape. The reality is that there are five critical layers where vulnerabilities live, and only one of them can be reliably managed with traditional patching.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/10/unpatchable-blog_attack-surface-graphic.png"&gt;&lt;/p&gt;

&lt;p&gt;The rest? They're unpatchable by nature. And each requires a different approach if you want to close the gaps. Let’s go through each one at a time:&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;1. Infrastructure&amp;nbsp;&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Infrastructure is the attack surface layer that everyone knows. It’s where traditional vulnerability management and patch management lives. And yes, it’s critical. But treating this as the whole (or only) attack surface is like locking your front door and ignoring the open windows.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;2. External attack surface&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;The &lt;a href="https://www.ivanti.com/products/external-attack-surface-management"&gt;external attack surface&lt;/a&gt; is what an adversary sees when they look at your organization from the outside. Your domains, subdomains and exposed services are entry points you don’t always control directly and often aren’t picked up in infrastructure scans.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;3. Cloud services&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Cloud misconfigurations are one of today’s most dangerous blind spots and also among the most overlooked, particularly in environments that have rapidly adopted cloud services without simultaneously evolving their security practices. We’ve seen the headlines about data exposed through misconfigured storage buckets or overly permissive APIs. These aren’t software flaws. They’re setup mistakes, and no patch can fix a poorly set permission.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;4. Identity&amp;nbsp;&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Then there’s identity. Every user account, credential and session token is a target. If a threat actor phishes your credentials or cracks a weak password, they’re not even exploiting a system vulnerability. They’re using your systems exactly as designed. Don’t mistake identity for a layer of access control. It serves as its own attack surface.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;5. Data&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;And finally: data. The way you classify, store and secure data all represent a surface area always being probed by attackers. If sensitive information is in the wrong place, with the wrong permissions, that’s an open invitation.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Patching is critical. It gives you remediation coverage on endpoints and servers. But it only addresses one piece of the puzzle. The rest of your environment requires a wider lens.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The reality is: exposures aren’t buried in code. They live in misconfigurations, overly broad permissions, architectural shortcuts and legacy systems either forgotten or left to rot in the background. Those don’t get fixed with a patch. They get fixed with strategy.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Examples of unpatchable vulnerabilities&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.cybersecuritydive.com/news/log4j-haunts-security-community/702011/" rel="noopener" target="_blank"&gt;Log4j&lt;/a&gt; was a wake-up call. A single vulnerable library embedded across dozens of applications, many of them business-critical. You couldn’t just “push a patch”. You had to wait for each vendor to update their software, and/or manually disable vulnerable components until you closed that hole.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;That’s just one example of how complexity can derail vulnerability management. Other cases are even more problematic:&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-iiot"&gt;IoT devices&lt;/a&gt; often operate as closed systems, with firmware controlled entirely by the vendor. If vendor support ends, you’re left with internet-connected assets that IT can’t update directly as firmware is locked behind vendor-controlled gates. Without updates, vulnerabilities remain exposed.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Network Edge Devices (Firewalls, VPNs, etc.) come with layers of complex rules, configurations and dependencies, configurations and dependencies that can’t be blindly updated. Every change must be tested against business-critical services to avoid outages. One single misstep can knock systems offline or break key integrations. That’s why most teams treat these updates like surgical procedures: slow, meticulous and weighed carefully against the organization’s &lt;a href="https://www.ivanti.com/blog/risk-appetite"&gt;risk appetite&lt;/a&gt;.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;And then there’s cryptographic decay. It’s the slow decay of trust in encryption as attackers get faster and standards grow older. TLS and SSL protocols, once considered rock solid, become exploitable over time.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;And none of them can be addressed by traditional patching models. They live outside the boundaries of what scanners catch and patching can solve. That’s why a broader security strategy, one rooted in exposure reduction and not just patching, needs to guide your approach.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Multifaceted risk mitigation strategies&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Start by targeting the weakest links in your environment: outdated protocols, misconfigurations and overexposed assets. Then, assess who and what has access to your systems. Shrink those access pathways to only what’s essential. This reduces the damage radius when something goes wrong.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Next, break risk mitigation into multiple workstreams. Not every vulnerability can be addressed the same way or on the same timeline. You need parallel tracks for short-term containment and long-term resilience.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In the short term, if you're facing an unpatchable vulnerability, ask: how do we minimize impact now? The Log4j response is a good model. There, we deployed scripts that disabled vulnerable components in real time, limiting exposure while waiting for a vendor patch.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;At the same time, build a longer-term framework. Automate configuration updates wherever possible. Create a roadmap for phasing out end-of-life apps and platforms. Map ownership across critical systems, including which teams or vendors control updates and what permissions or dependencies might block timely fixes. When an issue arises, that prep work determines whether you're reacting in chaos or executing a plan.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The tactics will vary — scripts, segmentation, zero trust, re-architecture — but the goal stays the same: reduce the time and space adversaries have to exploit your systems. Shrink the window. Stay ahead of it.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The organizations that succeed in managing unpatchable vulnerabilities are the ones who understand their environment inside and out. They never stop refining that understanding. That means having a real-time asset inventory, visibility into what’s running where and a comprehensive Software Bill of Materials (SBOM) that tells you what’s inside your software.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;They also monitor the entire attack surface. Not just endpoints, but external perimeters, cloud configurations, identity systems, and the data itself. Anything less than that leaves blind spots wide open.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;They build tight operational bridges between teams. When a high-risk exposure surfaces, network ops, application owners and developers already know who’s on point, what actions to take and how to move fast without triggering service disruptions.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Above all, they know that “unpatchable” doesn’t mean unmanageable. It just means you need a different playbook: one that’s layered, cross-functional and laser-focused on reducing real-world risk.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;For more on how to elevate your approach to vulnerability management and risk mitigation, check out Ivanti’s research report: &lt;a href="https://www.ivanti.com/resources/research-reports/risk-based-patch" target="_blank"&gt;Risk-Based Patch Prioritization&lt;/a&gt;.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
</description><pubDate>Mon, 20 Oct 2025 13:00:00 Z</pubDate></item><item><guid isPermaLink="false">9e9a6540-2b98-4a64-9124-117518ba31b4</guid><link>https://www.ivanti.com/blog/october-2025-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Management</category><category>Patch Tuesday</category><category>Security</category><title>October 2025 Patch Tuesday</title><description>&lt;p&gt;October Patch Tuesday is going to be a busy one from all angles. Microsoft exceeded the January CVE count (159 CVEs) by a healthy margin, with 172 CVEs resolved this month. There are three exploited and two publicly disclosed vulnerabilities this month, but fortunately all of them are in the cumulative OS update, making resolution quick and clean. They are also end of life-ing a lot of products, including Windows 10! Additionally, Office 2016 and 2019 and Exchange Server 2016 and 2019 have also reached end of life.&lt;/p&gt;

&lt;p&gt;Adobe released 12 updates resolving 36 CVEs. Mozilla released five updates resolving 45 CVEs and are cautioning users that three of these CVEs are showing signs they may have been exploited in the wild (unconfirmed). And of course, Google Chrome is expected to release their weekly update in the next 24 hours.&lt;/p&gt;

&lt;p&gt;There is a lot to unpack, so let’s get started.&lt;/p&gt;

&lt;h2&gt;Microsoft’s exploited vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved a Secure Boot bypass in IGEL OS before 11 vulnerability (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47827" rel="noopener" target="_blank"&gt;CVE-2025-47827&lt;/a&gt;), which Microsoft has confirmed is exploited in the wild. The CVE is rated Important and has a CVSS 3.1 score of 4.6. Secure Boot can be bypassed because the igel-flash-driver module improperly verifies a cryptographic signature, allowing a crafted root file system to be mounted from an unverified image.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Remote Access Connection Manager (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59230" rel="noopener" target="_blank"&gt;CVE-2025-59230&lt;/a&gt;), which Microsoft has confirmed is exploited in the wild. The CVE is rated Important and has a CVSS 3.1 score of 7.8. Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally. A risk-based prioritization methodology would warrant treating this as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Agere Modem Driver (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24990" rel="noopener" target="_blank"&gt;CVE-2025-24990&lt;/a&gt;), which Microsoft has confirmed is exploited in the wild. The CVE is rated Important and has a CVSS 3.1 score of 7.8.&amp;nbsp; The driver shipped natively with the Windows OS. Microsoft has removed the driver with the October cumulative update and recommends removing any existing dependencies on this fax modem hardware. Exploit is possible even if the drive is not being used. A risk-based prioritization methodology would warrant treating this as Critical.&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Agere Modem Driver (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24052" rel="noopener" target="_blank"&gt;CVE-2024-24052&lt;/a&gt;), which Microsoft has confirmed is publicly disclosed. The CVE is rated Important and has a CVSS 3.1 score of 7.8. The exploit code maturity is listed as proof-of-concept, which increases the risk of exploitation. A risk-based prioritization methodology would warrant treating this as Critical.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft has resolved an out-of-bounds read vulnerability in TCG TPM2.0 reference implementation (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-2884" rel="noopener" target="_blank"&gt;CVE-2024-2884&lt;/a&gt;), which Microsoft has confirmed is publicly disclosed. The CVE is rated Important and has a CVSS 3.1 score of 5.3. The exploit code maturity is listed as unproven, indicating there is currently no publicly available code.&lt;/p&gt;

&lt;h2&gt;Ivanti security advisories&lt;/h2&gt;

&lt;p&gt;Ivanti has released two updates and one Security Advisory for October Patch Tuesday, resolving a total of seven CVEs. The affected products include Ivanti Neurons for MDM and Ivanti Endpoint Manager Mobile. The Ivanti Neurons for MDM vulnerabilities were resolved for all customers on October 10, 2025. An additional Security Advisory was released for Ivanti Endpoint Manager, which provides mitigation options for vulnerabilities disclosed October 7, 2025.&lt;/p&gt;

&lt;p&gt;For more details, you can view the updates and information provided in the &lt;a href="https://www.ivanti.com/blog/october-2025-security-update"&gt;October Security Update on the Ivanti blog&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Adobe released 12 updates addressing 36 CVEs. Adobe has rated the Commerce update as a priority two and the rest of the updates as priority three.&lt;/li&gt;
	&lt;li&gt;Mozilla released five updates resolving 45 CVEs. Three of the CVEs included variations of the statement, “Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code,” indicating a possibility of exploitation in the wild. All five updates include at least one of the suspected exploit CVEs, we recommend treating all five as containing a known exploited CVE.&lt;/li&gt;
	&lt;li&gt;Google Chrome is expected to release in the next 24 hours, so plan a Chrome update and a possible Edge update shortly after.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;October update priorities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;The Windows OS cumulative update is the top priority this month, as it resolves three exploited and two publicly disclosed CVEs.&lt;/li&gt;
	&lt;li&gt;All Mozilla updates should be deployed during your current maintenance, but any deferral or delay would come with risks as there are three CVEs that are speculated to be exploitable in the wild already.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 14 Oct 2025 21:43:03 Z</pubDate></item><item><guid isPermaLink="false">1e06c1d3-73c7-4d72-a44e-2bbac861d0cd</guid><link>https://www.ivanti.com/blog/ring-deployment-user-feedback-patch-management-strategy</link><atom:author><atom:name>Dan Lahan</atom:name><atom:uri>https://www.ivanti.com/blog/authors/dan-lahan</atom:uri></atom:author><category>Patch Management</category><category>Security</category><title>Is Your Patch Process Hurting End Users’ Experience? Here’s How to Fix It</title><description>&lt;p&gt;Just one bad patch can cause key systems to fail, disrupting your teams and, ultimately, your customer experience.&lt;/p&gt;

&lt;p&gt;While I was checking out at a supermarket self-service machine, the screen suddenly froze and then dreaded blue screen of death appeared. A nearby staff member quickly came over and, with a bit of a sigh, said it was the third time that day this happened. While I’ll never know for certain whether a patch was the only cause, businesses want to minimize these types of issues.&lt;/p&gt;

&lt;p&gt;One bad patch can impact your organization, too. Imagine your customers unable to contact your client success team or your frontline workers unable to access critical data.&lt;/p&gt;

&lt;p&gt;While you could delay patch deployment, you run the risk of a total company outage due to a ransomware breach or other cyberattack.&lt;/p&gt;

&lt;p&gt;The reality is that vulnerability remediation requires never-ending vigilance. You can address many vulnerabilities through &lt;a href="https://www.ivanti.com/blog/effective-modern-patch-management-processes-and-best-practices-for-patch-operations"&gt;patch management&lt;/a&gt;, but without adequate testing, critical systems and business services can get disrupted, affecting your teams and, in short order, reducing profitability.&lt;/p&gt;

&lt;p&gt;Let’s take a look at how poorly managed patch updates can cause major disruptions. I’ll also discuss how a &lt;a href="https://www.ivanti.com/company/press-releases/2025/ivanti-launches-ring-deployment-to-reduce-patch-risk-and-help-customers-address-the-evolving-threat-landscape"&gt;ring-based deployment strategy&lt;/a&gt;, combined with user surveys after each stage of the rollout, provides a safer and smarter way to mitigate vulnerabilities and outages.&lt;/p&gt;

&lt;h2&gt;Patch deployment: The need for speed&lt;/h2&gt;

&lt;p&gt;Regular patch management is one the best ways to secure your data and services. Security frameworks provide best practices, guidance and standards for customers to adhere to; for example, &lt;a href="https://www.cisecurity.org/controls/v8" rel="noopener" target="_blank"&gt;CIS Controls v8&lt;/a&gt; guides teams to apply critical patches in less than seven days, and remediation must occur faster (within 24 hours) if a vulnerability is part of the CISA KEV list.&lt;/p&gt;

&lt;p&gt;Organizations comply with these (and the other controls) to reduce risk of catastrophic breaches, maintain regulatory compliance and reduction cyber insurance costs.&lt;/p&gt;

&lt;p&gt;In addition, vulnerability exploitation &lt;a href="https://www.verizon.com/about/news/2025-data-breach-investigations-report" rel="noopener" target="_blank"&gt;surged by 34%&lt;/a&gt; compared to last year (2024). Ransomware-as-a-Service (RaaS) has transformed cybercrime into a subscription economy, where low-skilled attackers can rent powerful ransomware kits from dark web marketplaces. This model dramatically lowered the barrier to entry, fueling a surge in global attacks and extortion attempts.&lt;/p&gt;

&lt;p&gt;Now, with the integration of artificial intelligence, threat actors can automate reconnaissance in attempts to locate vulnerable targets at speed. All this makes proper patch management more essential than ever. When a critically rated vulnerability is identified (e.g., a zero day), deployment speed is crucial — but you must balance it with control. &lt;a href="https://www.ivanti.com/blog/ring-deployment"&gt;Ring deployment&lt;/a&gt; acts as an early warning system by rolling out updates in controlled waves.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Ring deployment for secure, scalable patch management&lt;/h2&gt;

&lt;p&gt;Ring deployment for patch management is a phased approach to rolling out software updates or patches across an organization. Devices are grouped into “rings” based on risk tolerance and criticality. This tried-and-true method helps reduce the risk of widespread disruption by detecting and resolving issues early in the deployment cycle.&lt;/p&gt;

&lt;p&gt;&lt;img alt="Three concentric circles illustrate a software release process: the smallest red circle labeled “Test ring: Internal testers responsible for identifying critical issues,” surrounded by a purple circle labeled “Early adoption ring: Key stakeholders who are willing to provide feedback,” both inside the largest purple circle labeled “Full production ring: The entire user base.”" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/9/diagram_ring-deployment.png"&gt;&lt;/p&gt;

&lt;p&gt;And it gets even more powerful when you combine&amp;nbsp;it with telemetry from devices and user sentiment. Direct user feedback during each ring allows IT to deploy at scale and maintain speed.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Combine user surveys and ring deployment to stay ahead of potential patch issues&lt;/h2&gt;

&lt;p&gt;It’s that time again: your organization is rolling out a patch to address a critical vulnerability.&lt;/p&gt;

&lt;p&gt;You start with a ring-based deployment — a small group of IT staff and early adopters gets the update first. This initial phase helps validate that the patch installs cleanly without breaking core systems. Once it clears that stage, the patch moves to the next ring — maybe 500 general users from non-critical departments.&lt;/p&gt;

&lt;p&gt;With this quantity and diversity of devices, &lt;a href="https://www.ivanti.com/resources/bot-library/user-productivity/post-patch-survey"&gt;user feedback&lt;/a&gt; helps you determine if the overall update worked and can even help you identify when downstream issues may occur before you move onto the next ring.&lt;/p&gt;

&lt;p&gt;In your user surveys, collect feedback on:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;System performance.&lt;/li&gt;
	&lt;li&gt;Usability.&lt;/li&gt;
	&lt;li&gt;Post-patch issues experienced by users in the current ring.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This way, you can gate your rollout — if survey results reveal a high rate of negative feedback or unresolved issues, pause the deployment for investigation and remediation. Open support tickets, gather device logs and alert your IT team.&lt;/p&gt;

&lt;p&gt;This feedback loop ensures that only stable, well-received updates advance, reinforcing trust in IT processes and reducing the risk of vulnerabilities making it into high-impact environments, like your customer care center.&lt;/p&gt;

&lt;p&gt;&lt;img alt="Workflow diagram for patch rollout featuring a smiling robot with a clipboard. Steps include &amp;quot;Patch Rollout&amp;quot; (red box at top), &amp;quot;Send Survey,&amp;quot; &amp;quot;Collect Data,&amp;quot; then branching to &amp;quot;Register Feedback&amp;quot; (red oval, left) and &amp;quot;File an IT Ticket&amp;quot; (purple oval, right). The robot stands beside a checklist with green check marks and a thumbs-up badge." src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/9/diagram_patch-rollout.png"&gt;&lt;/p&gt;

&lt;h2&gt;Scale your security posture and minimize disruptions with ring deployment and user feedback&lt;/h2&gt;

&lt;p&gt;When you combine ring deployment and patch experience user surveys, your organization can successfully deploy all critical patches in a timely manner, meeting both security best practices and compliance requirements. Systems are secure, risks from known vulnerabilities are reduced and auditors can see evidence of a timely, controlled process.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-patch-management"&gt;Ivanti Neurons for Patch Management&lt;/a&gt; helps you make patch deployment a seamless process by surveying users directly in the patch experience, automatically pausing rollouts if survey results reveal issues or users respond negatively.&lt;/p&gt;

&lt;p&gt;Remember, patching is never truly finished—new vulnerabilities are disclosed daily, and the next cycle of updates is already on the horizon. Staying secure means repeating this process consistently, ensuring that each patch cycle closes today’s risks while preparing for tomorrow’s threats.&lt;/p&gt;
</description><pubDate>Tue, 23 Sep 2025 14:58:00 Z</pubDate></item><item><guid isPermaLink="false">419bfa61-ee47-4c09-aa89-434ff944ccb0</guid><link>https://www.ivanti.com/blog/september-2025-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Patch Management</category><category>Security</category><title>September 2025 Patch Tuesday</title><description>&lt;p&gt;The days leading into September Patch Tuesday include a bit of chaos from a pair of actively exploited Android CVEs (CVE-2025-38352, CVE-2025-48543), a zero day in WhatsApp (CVE-2025-55177), another zero day in WinRAR (CVE-2025-8088), and a major supply chain attack through the Drift AI Chat Agent exposing Salesforce customers data.&lt;/p&gt;

&lt;p&gt;The good news is Microsoft only has a pair of publicly disclosed vulnerabilities (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55234" rel="noopener" target="_blank"&gt;CVE-2025-55234&lt;/a&gt;, &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21907" rel="noopener" target="_blank"&gt;CVE-2024-21907&lt;/a&gt;) out of 81 total CVEs resolved this month, making this about as close to a calm Patch Tuesday as we can hope for.&lt;/p&gt;

&lt;p&gt;The Windows OS and Office updates are rated Critical this month, putting those as the highest priority, but with no zero-day exploits, this month should be focused on routine maintenance from a Microsoft perspective.&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Windows SMB (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55234" rel="noopener" target="_blank"&gt;CVE-2025-55234&lt;/a&gt;), which Microsoft has confirmed is publicly disclosed. Microsoft rates the CVE as Important, and it has a CVSS v3.1 score of 8.8 and affects all Windows OS editions. The code maturity is unproven, which would indicate no code samples have been disclosed. A risk-based prioritization methodology would warrant treating this as Important.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved an Improper Handling of Exceptional Conditions vulnerability in Newtonsoft.Json (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21907" rel="noopener" target="_blank"&gt;CVE-2024-21907&lt;/a&gt;), which Microsoft has confirmed is publicly disclosed. The CVE is unrated and affects SQL Server 2016, 2017 and 2019. Depending on the usage of the library, an unauthenticated and remote attacker may be able to cause the denial-of-service condition. A risk-based prioritization methodology would warrant treating this as Important.&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities&lt;/h2&gt;

&lt;p&gt;Adobe has released nine updates resolving 22 CVEs, 12 of which are rated Critical. The products affected include Adobe Acrobat Reader, After Effects, Premiere Pro, Commerce, Substance 3D Viewer, Experience Manager, Dreamweaver, 3D Substance Modeler and ColdFusion. Adobe has rated the ColdFusion update as a priority one and Commerce as a priority two. The other seven updates are rated priority three.&lt;/p&gt;

&lt;h2&gt;Ivanti security advisories&lt;/h2&gt;

&lt;p&gt;Ivanti has released two updates for September Patch Tuesday resolving a total of 13 CVEs. The affected products include Ivanti Connect Secure and Policy Secure and Ivanti EPM.&lt;/p&gt;

&lt;p&gt;For more details, you can view the updates and information provided in the &lt;a href="https://www.ivanti.com/blog/september-2025-security-update"&gt;September Security Update on the Ivanti blog&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;September update priorities&lt;/h2&gt;

&lt;p&gt;With no zero-days released on Patch Tuesday, the updates this month are predominantly low risk. Ensure you have the zero days leading up to Patch Tuesday in hand, and plan to deploy the Microsoft and Adobe updates through your regular maintenance activities this month.&lt;/p&gt;
</description><pubDate>Tue, 09 Sep 2025 21:28:36 Z</pubDate></item><item><guid isPermaLink="false">3ae8d951-7002-41fd-976c-737c26267f79</guid><link>https://www.ivanti.com/blog/august-2025-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Patch Management</category><category>Security</category><title>August 2025 Patch Tuesday</title><description>&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="platform" value="youtube"&gt;&lt;param name="id" value="cLNedMpRCyk"&gt;&lt;param name="cms_type" value="video"&gt;&lt;/object&gt;&lt;/p&gt;

&lt;p&gt;Let me start this month off with a question. Have you already decided what you are going to do for your remediation plan this month? Think about it for a second. OS updates, productivity apps, browsers, and other apps are already likely under consideration for your August patch maintenance. The real decisions you need to consider are around timing. Do you proceed with your typical Patch Tuesday plan or do you need to accelerate any zero-days, etc?&lt;/p&gt;

&lt;p&gt;What you just thought about was a generalization of defining your risk appetite. There is a lot of discussion across the vulnerability management market about how to modernize vulnerability management. When you think about trends like 32% of 1H 2025 known exploited vulnerabilities (KEVs) being zero-day or 1-day exploits it can feel overwhelming. How do you keep up with a continuous stream of updates? Ideally by defining your outcome and configuring for success.&lt;/p&gt;

&lt;p&gt;If we break this month’s Patch Tuesday down into parallel remediation streams:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Routine Maintenance: Much of what just released today will fall into your reoccurring monthly maintenance which typically starts on Patch Tuesday and runs for two weeks or more depending on your SLAs, OS, productivity apps, third-party apps, etc.&lt;/li&gt;
	&lt;li&gt;Priority updates: Browsers tend to release more frequently (typically weekly) and may warrant a priority update track to keep up with the constant stream of new exposures in your environment. This patch cycle you may be resolving CVEs in multiple browsers from the past four weeks if you don’t have a more frequent update plan in place for the browsers.&lt;/li&gt;
	&lt;li&gt;Zero-day Response: The recent SharePoint exploits are a good example of the disruptive\unpredictable nature of zero-day exploits.&lt;/li&gt;
	&lt;li&gt;Continuous Compliance: The three previous tracks could solve most of your remediation challenges, but what about users who are on vacation, leave of absence, got a new system and shipping bypassed the current month’s maintenance window or installed something new that was not the latest version? Defining a baseline and keeping that updated as new updates pass your quality tests would keep your systems in compliance when the multitude of reasons for drift occur.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Microsoft resolved one publicly disclosed vulnerability in Windows Kerberos (CVE-2025-53779). The CVE is an Elevation of Privilege vulnerability that could allow an attacker to gain domain admin privileges. The CVE is rated Medium and has a CVSS score of 7.2. The vulnerability only affects Windows Server 2025.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Third-party vulnerabilities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Adobe released thirteen new updates on Patch Tuesday, but the most urgent is the Adobe Experience Manager Forms update released on August 5 resolving two publicly disclosed CVEs (CVE-2025-54253 and CVE-2025-54254). &lt;a href="https://helpx.adobe.com/security/products/aem-forms/apsb25-82.html" rel="noopener" target="_blank"&gt;APSB25-82&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;Google Chrome 139.0.7258 released resolving five CVEs and is rated Critical. This will also affect Microsoft Edge so watch for that update to come likely later this week.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;August update priorities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Microsoft SharePoint is the top priority this month to resolve recent zero-day exploits being targeted by multiple nation state level threat actors. Update ASAP.&lt;/li&gt;
	&lt;li&gt;Adobe Experience Manager Forms update released on August 5 is your second highest priority.&lt;/li&gt;
	&lt;li&gt;Windows OS and Office have Critical CVEs this month. Get them updated as part of your regular maintenance and you should be good.&lt;/li&gt;
	&lt;li&gt;Microsoft Exchange Server and SQL Server each received updates. The CVEs were only rated as Important so no need to escalate remediation, but server admins should start to test and rollout within the next month.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 12 Aug 2025 22:08:03 Z</pubDate></item><item><guid isPermaLink="false">701f3765-2d1a-4e95-86e2-42564105482d</guid><link>https://www.ivanti.com/blog/windows-11-migration-strategy</link><atom:author><atom:name>Mariah Shotts</atom:name><atom:uri>https://www.ivanti.com/blog/authors/mariah-shotts</atom:uri></atom:author><category>Endpoint Management</category><category>Patch Management</category><title>Windows 11 Migration: Ivanti's Customer Zero Journey with Win11 Upgrades</title><description>&lt;p&gt;Windows 11 offers enhanced security and a modern user interface, but the transition can be complex for large organizations, with logistical and employee buy-in challenges. Microsoft will end support for Windows 10 on October 14, 2025, so it's crucial to start planning and executing Windows 11 deployments now.&lt;/p&gt;

&lt;h2&gt;The need to migrate to Windows 11&lt;/h2&gt;

&lt;p&gt;Migrating to Windows 11 is essential for staying current, secure and efficient. It provides advanced security features like stronger encryption and improved threat detection, safeguarding your data and enhancing IT resilience. The user-friendly interface also streamlines daily tasks, boosting productivity. With Microsoft ending support for Windows 10 this year, upgrading can help organizations avoid increased security risks and potential downtime. According to &lt;a href="https://www.gartner.com/en/documents/6338779" rel="noopener" target="_blank"&gt;Gartner&lt;/a&gt;, many enterprises are opting to replace even compatible machines with new hardware to ensure optimal performance with Windows 11. Proactive planning ensures a smooth and seamless transition.&lt;/p&gt;

&lt;h2&gt;Ivanti’s use-case for Windows 10 to Windows 11 migration&lt;/h2&gt;

&lt;p&gt;At Ivanti, we’ve been successfully rolling out Windows 11 migrations since the beginning of 2025. Like many large organizations, this migration is something we’ve been discussing and planning for quite some time. The goal is to update every eligible machine in a timely manner and triage ineligible machines for further troubleshooting or replacement.&lt;/p&gt;

&lt;p&gt;To meet this goal, we prioritized using our own Ivanti Neurons platform solutions, which equipped us with the proactive tools and insights necessary for a successful Windows 11 deployment. Using a phased approach, we were able to identify and address issues coming back from early adopters and gather valuable feedback. Once we saw validation of our plan, we could gradually roll out the upgrade to the rest of the organization, ensuring a smoother migration overall.&lt;/p&gt;

&lt;h2&gt;Potential challenges&lt;/h2&gt;

&lt;p&gt;Like any other company, we wanted to get ahead of any potential barriers to a successful migration.&lt;/p&gt;

&lt;h3&gt;Hardware compatibility and unknown devices&lt;/h3&gt;

&lt;p&gt;One of the biggest challenges in upgrading to Windows 11 is meeting the hardware requirements. Many existing devices may not satisfy Microsoft's strict criteria, limiting the number of eligible machines. This can be especially problematic for organizations with a mix of older hardware. To tackle this, Ivanti’s IT team used our discovery capabilities to perform a thorough inventory and assessment of all devices, identifying those that would need to be upgraded or replaced before starting the migration. You can’t migrate devices you don’t know about, which made a comprehensive view of our IT landscape a key first step.&lt;/p&gt;

&lt;h3&gt;End-user friction and disruptions to productivity&lt;/h3&gt;

&lt;p&gt;User resistance to new interfaces and features can be another barrier to success. Change can be daunting, and the new look and features of Windows 11 may intimidate users accustomed to older versions. OS upgrades can also cause disruptions to users’ work, causing frustrations and downtime. To minimize these issues, Ivanti’s IT team wanted to make sure that updates were happening at a time most convenient to the end user to avoid losing unsaved work or disrupting productivity in general.&lt;/p&gt;

&lt;h3&gt;Continuing security updates with extended support&lt;/h3&gt;

&lt;p&gt;Not every machine can immediately upgrade to Windows 11 due to hardware requirements. However, Ivanti’s extended support will allow us to continue Windows 10 security updates past October, keeping these devices protected and functional.&lt;/p&gt;

&lt;p&gt;Ivanti’s Extended Security Update (ESU) deployment streamlines the patching process, reduces IT workload and maintains compliance with regulations like GDPR, HIPAA, or PCI-DSS. Unpatched systems face over 1,200 vulnerabilities annually, and a data breach can cost an average of $4.45 million, according to &lt;a href="https://www.ibm.com/reports/data-breach" rel="noopener" target="_blank"&gt;IBM&lt;/a&gt;. We need to make sure that any devices that don’t update to Windows 11 are kept safe and secure from vulnerabilities.&lt;/p&gt;

&lt;p&gt;Extended support also helps us extend our device lifecycle for devices that aren’t quite ready to be replaced, or when budget constraints are a factor. According to Gartner, many enterprises are still delaying purchases despite the need to move from Windows 10 to Windows 11, extending the lifecycle of their existing equipment and seeking alternatives to maximize their budgets. Ivanti’s ESU solutions help extend the lifespan of these devices, avoiding the high costs of a full hardware refresh. This ensures seamless patching, minimizes security risks and reduces manual IT effort, helping us avoid potential losses and disruptions.&lt;/p&gt;

&lt;h2&gt;Ivanti’s Windows 11 migration workflow&lt;/h2&gt;

&lt;p&gt;Ivanti Neurons allowed us to automate key elements of the migration, from the initial device assessment to the upgrade itself, streamlining each phase and allowing our IT team to concentrate on other mission-critical activities. In general, here is how the workflow for updating devices from Windows 10 to Windows 11 looks at Ivanti.&lt;/p&gt;

&lt;h3&gt;1. Preparation&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Identify Devices:&lt;/strong&gt; Create a group of Windows 10 devices that need to be upgraded.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Download Files:&lt;/strong&gt; Push necessary files to the devices, ensuring efficient data transfer by using ZIP files.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;2. Pre-Check&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Eligibility Check:&lt;/strong&gt; Run PowerShell scripts to verify if the device meets the hardware requirements for Windows 11.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Power Check:&lt;/strong&gt; Ensure the device is connected to A/C power.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;3. User Interaction&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Notification:&lt;/strong&gt; Use Teams bot integration to notify users about the upgrade and allow them to schedule it.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Consent:&lt;/strong&gt; Users provide consent for the upgrade via an interactive Teams message.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;img alt="it notices" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/7/win11screenshot.png"&gt;&lt;/p&gt;

&lt;h3&gt;4. Upgrade Execution&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Run Upgrade:&lt;/strong&gt; Execute the Windows Update Assistant to perform the upgrade.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Monitor Progress:&lt;/strong&gt; Track the upgrade process and handle any errors or issues that arise.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;5. Post-Upgrade Actions&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Restart Device:&lt;/strong&gt; Prompt users to restart their devices to complete the upgrade.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Activation Check:&lt;/strong&gt; Verify that the device is activated with an enterprise license key.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Additional Updates:&lt;/strong&gt; Apply any necessary Windows updates post-upgrade.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;6. Error Handling&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Automated Ticket Creation:&lt;/strong&gt; Use a bot to generate tickets for devices that fail the upgrade process.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Troubleshooting:&lt;/strong&gt; Enterprise services team handles cases where devices cannot be upgraded automatically.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;7. Continuous Improvement&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Refinement:&lt;/strong&gt; Break down the upgrade process into smaller automated steps to streamline operations.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Feedback:&lt;/strong&gt; Incorporate user feedback to improve the upgrade experience.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This workflow ensures a smooth transition from Windows 10 to Windows 11 while minimizing disruptions and handling exceptions efficiently. This process has been rolled out gradually, taking it one week at a time. It’s been thoughtful and intentional, working to build this process and workflow for the future by ensuring it’s flexible and modular. That way, we can revisit a similar process for the next generation of Windows whenever it comes.&lt;/p&gt;

&lt;h2&gt;Ready to start your Windows 11 migration?&lt;/h2&gt;

&lt;p&gt;Migrating to Windows 11 is essential for maintaining security, efficiency and compliance. Ivanti has leveraged our own solutions to automate key steps, gather user feedback and provide extended security updates for ineligible devices, all while ensuring a smooth transition that minimizes end-user disruption and maximizes IT efficiency.&lt;/p&gt;

&lt;p&gt;Ivanti’s approach and workflow not only addresses current challenges but also sets up a flexible and modular foundation for future OS upgrades.&lt;/p&gt;

&lt;p&gt;Ready to start your own Windows 11 migration? Learn how Ivanti Neurons can simplify and automate the process.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/ivanti-neurons"&gt;Explore Ivanti Neurons&lt;/a&gt;&lt;/p&gt;
</description><pubDate>Mon, 21 Jul 2025 15:46:23 Z</pubDate></item><item><guid isPermaLink="false">d95dc7b1-8024-40d9-915e-a4549e38b7fa</guid><link>https://www.ivanti.com/blog/july-2025-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Patch Management</category><category>Security</category><title>July 2025 Patch Tuesday</title><description>&lt;p&gt;July Patch Tuesday is a sizable one, but no significant security risk. Microsoft resolved 130 new CVEs, including one public disclosure. There are seven additional CVEs from MITRE regarding vulnerabilities in Git resolved through the Visual Studio update this month. Fourteen CVEs are rated Critical by Microsoft, affecting Windows OS, Office, SharePoint, and SQL.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The DHCP issue caused by the June 2025 update appears to be resolved. It is not reported as a known issue for Windows OS KBs, and some quick querying through Gemini agrees the issue appears to be resolved.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Gemini’s response to the query is below:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;July update server DHCP issue resolved&lt;/p&gt;

&lt;p&gt;Yes, according to information available on July 8, 2025, Microsoft has resolved the DHCP server issue that was caused by the June 2025 security updates.&lt;/p&gt;

&lt;p&gt;Key points:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;June 2025 updates caused the problem: Microsoft's June 2025 Patch Tuesday updates introduced a bug that could cause the DHCP service to freeze or stop responding on Windows Server 2016 through 2025. This issue prevented some clients from renewing their IP addresses.&lt;/li&gt;
	&lt;li&gt;Fix released in July updates: Microsoft released Windows updates on July 8, 2025, and subsequent updates that resolve this issue.&lt;/li&gt;
	&lt;li&gt;Workaround before the fix: Before the July updates were available, the recommended workaround was to uninstall the affected June updates and restart the server, but this left systems vulnerable to security threats patched in those updates.&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;

&lt;p&gt;The Windows Server OS updates this month resolve 16 CVEs in Windows Routing and Remote Access Service (RRAS). These vulnerabilities could allow an unauthenticated attacker to convince a user to initiate a connection to a malicious server that could allow them to execute arbitrary code. The attack would require no privileges and could be exploited over the network. Applying the updates to the OS is the best solution, but additional mitigations like restricting RRAS ports to trusted networks or VPN concentrators can limit exposure, as well as employing firewall rules and disabling unused RRAS features.&lt;/p&gt;

&lt;p&gt;Developers have a bit of work to do on their side this month. Microsoft resolved seven CVEs in Git and two additional CVEs that require a Visual studio update this month.&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved an Information Disclosure in Microsoft SQL (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49719" rel="noopener" target="_blank"&gt;CVE-2025-49719&lt;/a&gt;), which Microsoft has confirmed is publicly disclosed. Microsoft rates the CVE as Important, and it has a CVSS v3.1 score of 7.5. The code maturity is unproven, which would indicate no code samples. A risk-based prioritization methodology would warrant treating this as Important.&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities&lt;/h2&gt;

&lt;p&gt;Google Chrome resolved their fourth zero-day exploit on June 30, so from a risk-based prioritization perspective, Chrome and Edge updates that take the focus leading up to Patch Tuesday. &lt;a href="https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_30.html" rel="noopener" target="_blank"&gt;CVE-2025-6554&lt;/a&gt; was resolved in build 138.9.7204.96/.97 for Windows, 138.0.7204.92/.93 for Mac and 138.0.7204.92 for Linux, which they indicated would roll out over the coming days/weeks.&lt;/p&gt;

&lt;h2&gt;Ivanti security advisory&lt;/h2&gt;

&lt;p&gt;Ivanti has released three updates for July Patch Tuesday resolving a total of 11 CVEs. The affected products include Ivanti Connect Secure and Policy Secure, Ivanti EPMM and Ivanti EPM.&lt;/p&gt;

&lt;p&gt;For more details, you can view the updates and information provided in the &lt;a href="https://www.ivanti.com/blog/july-security-update-2025"&gt;July Security Update on the Ivanti blog&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;July update priorities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;The Google Chrome and Microsoft Edge browsers are the top priority this month. Ensure you have deployed the latest updates to resolve the zero-day exploit (&lt;a href="https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_30.html" rel="noopener" target="_blank"&gt;CVE-2025-6554&lt;/a&gt;) that was identified on June 30.&lt;/li&gt;
	&lt;li&gt;Windows Server OS updates are likely the biggest security priority this month, especially for those who experienced the DHCP issues after the June update and had to uninstall the June update.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 08 Jul 2025 21:17:47 Z</pubDate></item><item><guid isPermaLink="false">ba181d8d-6bbb-41d4-9d70-0216bae9cdd8</guid><link>https://www.ivanti.com/blog/june-2025-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><category>Patch Management</category><title>June 2025 Patch Tuesday</title><description>&lt;p&gt;June Patch Tuesday is upon us. There has been a lot of activity in the past few weeks. Mid-May was the &lt;a href="https://www.zerodayinitiative.com/blog?tag=Pwn2Own" rel="noopener" target="_blank"&gt;Pwn2Own Berlin 2025 event&lt;/a&gt;, and the $1M USD in rewards that were paid out came with many newly discovered vulnerabilities affecting Microsoft, Google, Mozilla, VMware, NVIDIA, Oracle and other vendors. Since the event, there have been several updates from many of these vendors, so expect a lot of third-party updates to update this month from releases leading up to Patch Tuesday.&lt;/p&gt;

&lt;p&gt;Microsoft released updates resolving 66 CVEs, nine of which are rated Critical. In addition, there is one public disclosure and one zero-day exploit. Updates this month affect Windows, Office, SharePoint, Visual Studio, and .Net. The zero day and public disclosure are both resolved by the Windows OS update this month.&lt;/p&gt;

&lt;p&gt;Third-party updates from Mozilla, Google (including two recent zero-day exploits) and Adobe leading up to Patch Tuesday will add to the load. If your organization is updating applications like browsers on a weekly basis to keep up with continuous release applications commonly used to target end users, you should be up to date on all but Adobe. If not, you will want to ensure to get these queued up for your patch maintenance.&lt;/p&gt;

&lt;h2&gt;Microsoft exploited vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved a Remote Code Execution vulnerability in Web Distributed Authoring and Versioning (WEBDAV) (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33053" rel="noopener" target="_blank"&gt;CVE-2025–33053&lt;/a&gt;) which Microsoft has confirmed to be exploited in the wild. Microsoft rates the CVE as Important and it has a CVSS v3.1 score of 8.8. Risk-based prioritization would treat this as Critical.&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Windows SMB Client (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33073" rel="noopener" target="_blank"&gt;CVE-2025–33073&lt;/a&gt;), which Microsoft has confirmed is publicly disclosed. Microsoft rates the CVE as Important and it has a CVSS v3.1 score of 8.8. The code maturity is Proof-of-Concept and the vulnerability is remotely exploitable, which will make this a desirable target for threat actors. A risk-based prioritization methodology would warrant treating this as Critical.&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities&lt;/h2&gt;

&lt;p&gt;Google Chrome continues their weekly security update cadence. Expect a Chrome update this week to add to the four releases and 14 CVEs resolved since May Patch Tuesday. This includes two zero-day exploits resolved in the past few weeks (CVE-2025–5419 and CVE-2025–4664).&lt;/p&gt;

&lt;p&gt;Mozilla has released multiple security updates since the Pwn2Own Berlin event. The two CVEs exploited in the event were resolved in the May 17 release (Firefox 138.0.4) and since then, Mozilla has released Firefox 139 and 139.0.4, as well as updates for Firefox ESR and Thunderbird. Ensure you have the latest Mozilla updates queued up this Patch Tuesday.&lt;/p&gt;

&lt;p&gt;Adobe has released updates for Acrobat Reader and six other products, resolving 259 CVEs. 225 of these were included in the Experience Manager update, with hefty contributions from a handful of diligent security researchers.&lt;/p&gt;

&lt;h2&gt;Ivanti security advisory&lt;/h2&gt;

&lt;p&gt;Ivanti has released one update for June Patch Tuesday resolving a total of three CVEs. The affected product is Ivanti Workspace Control.&lt;/p&gt;

&lt;p&gt;For more details you can view the updates and information provided in the &lt;a href="https://www.ivanti.com/blog/june-security-update"&gt;June Security Update on the Ivanti blog&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;June update priorities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;The Windows OS is the top priority this month with one zero-day exploit (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33053" rel="noopener" target="_blank"&gt;CVE-2025–33053&lt;/a&gt;) and one public disclosure (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33073" rel="noopener" target="_blank"&gt;CVE-2025–33073&lt;/a&gt;).&lt;/li&gt;
	&lt;li&gt;Google Chrome should be a top priority if you have not deployed updates for June 2 and earlier, as it will resolve two zero-day exploits (CVE-2025–5419 and CVE-2025–4664).&lt;/li&gt;
	&lt;li&gt;Browsers in general should be updated weekly to keep up with the continuous release cycle. Edge, Chrome and Firefox received multiple updates since May Patch Tuesday, including multiple high-profile disclosures and zero-day exploits.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 10 Jun 2025 20:52:28 Z</pubDate></item><item><guid isPermaLink="false">34200be4-39ae-48b7-bc0f-9ef5f2e9cb32</guid><link>https://www.ivanti.com/blog/patch-tuesday-may-2025</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><category>Patch Management</category><title>May 2025 Patch Tuesday</title><description>&lt;p&gt;May Patch Tuesday resolves five actively exploited and two publicly disclosed vulnerabilities. Spoiler alert: all five zero-days are resolved by deploying the Windows OS update. Also, this month Windows 11 and Server 2025 updates include some new AI features, but they carry a lot of baggage. Literally – they are around 4GB! New AI features include Recall, Click to Do and Improved Windows Search.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved a total of 72 new CVEs this month, six of which are rated Critical. The five zero-day vulnerabilities are rated Important, but using a risk-adjusted scoring model they would all be rated Critical.&lt;/p&gt;

&lt;h2&gt;Microsoft exploited vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft resolved an Elevation of Privilege vulnerability in Windows Ancillary Function Driver for WinSock (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32709" target="_blank" rel="noopener"&gt;CVE-2025-32709&lt;/a&gt;) that could allow an attacker to elevate privileges locally to gain administrator privileges. The vulnerability affects Windows Server 2012 and later OS versions. The vulnerability is confirmed to be exploited in the wild. Microsoft severity is rated as Important and has CVSS 3.1 of 7.8. Risk-based prioritization warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft resolved a pair of Elevation of Privilege vulnerabilities in Windows’ Common Log File System Drive (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32706" target="_blank" rel="noopener"&gt;CVE-2025-32706&lt;/a&gt; and &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32701" target="_blank" rel="noopener"&gt;CVE-2025-32701&lt;/a&gt;) that could allow an attacker to elevate privileges locally to gain SYSTEM privileges. The vulnerabilities affect all Windows OS versions. The vulnerabilities are confirmed to be exploited in the wild. Microsoft’s severity rating for both CVEs is Important and CVSS 3.1 of 7.8. Risk-based prioritization warrants treating these vulnerabilities as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft resolved an Elevation of Privilege vulnerability in Microsoft DWM Core Library (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30400" target="_blank" rel="noopener"&gt;CVE-2025-30400&lt;/a&gt;) that could allow an attacker to elevate privileges locally to gain SYSTEM privileges. The vulnerability affects Windows 10, Server 2016 and later OS versions. The vulnerability is confirmed to be exploited in the wild. Microsoft’s severity is rated as Important and has CVSS 3.1 of 7.8. Risk-based prioritization warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft resolved a Memory Corruption vulnerability in Microsoft Scripting Engine (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30397" target="_blank" rel="noopener"&gt;CVE-2025-30397&lt;/a&gt;) that could allow an unauthorized attacker to execute code over a network. The vulnerability affects all Windows OS versions. The vulnerability is confirmed to be exploited in the wild. Microsoft’s severity is rated as Important and has CVSS 3.1 of 7.8. Risk-based prioritization warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft resolved a Remote Code Execution vulnerability in Visual Studio (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32702" target="_blank" rel="noopener"&gt;CVE-2025-30397&lt;/a&gt;) that could allow an unauthorized attacker to execute code locally. The vulnerability affects Visual Studio 2019 and 2022. The vulnerability has been publicly disclosed, but the code maturity was set to Unproven and exploitability assessment is less likely.&lt;/p&gt;

&lt;p&gt;Microsoft resolved an Identity Spoofing vulnerability in Microsoft Defender (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26685" target="_blank" rel="noopener"&gt;CVE-2025-26685&lt;/a&gt;) that could allow an unauthorized attacker to perform spoofing over an adjacent network. The vulnerability affects Microsoft Defender for Identity. The vulnerability has been publicly disclosed, but the code maturity was set to Unproven and exploitability assessment is less likely.&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Adobe has released 13 updates this month resolving 39 CVEs, 33 of which are Critical. For more details, see &lt;a href="https://helpx.adobe.com/security.html" target="_blank" rel="noopener"&gt;Adobe’s Latest Product Security Updates&lt;/a&gt;.&lt;/li&gt;
	&lt;li&gt;Google Chrome is expected to release a weekly update shortly, so keep an eye out.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Ivanti security advisory&lt;/h2&gt;

&lt;p&gt;Ivanti has released four updates for May Patch Tuesday resolving a total of four CVEs and one CWE. The affected products include Ivanti Neurons for ITSM (on-prem only), Ivanti ICS, Ivanti Neurons for MDM and Ivanti EPMM.&lt;/p&gt;

&lt;p&gt;The Ivanti EPMM update resolves a medium and a high CVE that when chained together, successful exploitation could lead to unauthenticated remote code execution. Ivanti is aware of a very limited number of customers whose solution has been exploited at the time of disclosure.&lt;/p&gt;

&lt;p&gt;For more details you can view the updates and information provided in the &lt;a href="https://www.ivanti.com/blog/may-2025-security-update"&gt;May Security Update on the Ivanti blog&lt;/a&gt; and &lt;a href="https://www.ivanti.com/blog/epmm-security-update"&gt;EPMM Security Updated&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;May update priorities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Windows OS is your top priority this month with five zero-day exploits reported (CVEs).&lt;/li&gt;
	&lt;li&gt;Ivanti EPMM customers should apply either of the mitigation options or update as soon as possible.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 13 May 2025 22:03:04 Z</pubDate></item><item><guid isPermaLink="false">522eeffe-41ed-4633-8064-6a4bfc1b576c</guid><link>https://www.ivanti.com/blog/ring-deployment</link><atom:author><atom:name>Sydney Lesser</atom:name><atom:uri>https://www.ivanti.com/blog/authors/sydney-lesser</atom:uri></atom:author><category>Patch Management</category><title>What is Ring Deployment? A Guide to Phased Software Rollouts</title><description>&lt;p&gt;Exploitation of vulnerabilities &lt;a href="https://www.verizon.com/business/resources/T625/reports/2024-dbir-data-breach-investigations-report.pdf" rel="noopener" target="_blank"&gt;increased 180% year over year&lt;/a&gt; from 2023 to 2024, which means that quickly and effectively securing endpoints – always a priority – will only continue to escalate. Patching these vulnerabilities promptly, but without sacrificing stability, can present operational challenges. One way to achieve this: ring deployment — a technique that progressively scales rollouts to user groups. Below, we'll explore what ring deployment is, how it works and why it's an essential strategy for IT and security teams.&lt;/p&gt;

&lt;h2&gt;Understanding the ring deployment model&lt;/h2&gt;

&lt;p&gt;The ring deployment model is a structured approach to software rollouts that involves deploying updates or new features in progressive stages, or "rings." Each ring represents a different group of users, starting with a small, controlled group and gradually expanding to a larger audience. This method allows teams to test and validate changes in a controlled environment before releasing them to the entire user base.&lt;/p&gt;

&lt;p&gt;Once the initial ring-based deployment proves successful and any issues are ironed out, teams can confidently expand the update to the next ring. This step-by-step expansion helps minimize the risk of widespread problems and makes the deployment more reliable.&lt;/p&gt;

&lt;h2&gt;How ring-based deployment works: a step-by step guide&lt;/h2&gt;

&lt;p&gt;The first step in implementing a ring deployment strategy is to define your rings. Each ring should represent a different group of users, with the size and composition of each group tailored to your organization's needs. Rings can be tailored to suit business needs, including:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Test ring:&lt;/strong&gt; a small group of internal testers or IT staff responsible for identifying critical issues.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Early adopters ring:&lt;/strong&gt; A slightly larger group of users, including key stakeholders who are willing to test new features and provide feedback.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Full production ring:&lt;/strong&gt; The final stage, where the software is released to the entire user base not covered in the test and early adopters rings.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Once your rings are defined, the next step is to deploy the software to the early rings and closely monitor performance. At this stage, you’ll track performance, bugs such as app crashes and error rates and user feedback. This data will help identify any issues that need to be addressed before progressing to the next ring.&lt;/p&gt;

&lt;p&gt;After successfully deploying to the early rings and addressing any issues, the next step is to gradually expand the rollout to larger groups. This phased approach ensures that the software remains stable and performs well as it reaches a broader audience.&lt;/p&gt;

&lt;p&gt;The final stage is the full production deployment, where the software is released to the entire user base. Even after reaching this stage, it's important to continue monitoring performance and gathering feedback to make ongoing improvements.&lt;/p&gt;

&lt;h2&gt;Best practices for implementing a ring deployment strategy&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Aligning rings with business impact levels:&lt;/strong&gt; Ensuring that rings are aligned with the business impact levels of your organization makes sure you to protect critical business functions and promptly address potential issues.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Automating deployments for efficiency:&lt;/strong&gt; This can help improve efficiency and reduce the risk of human error. Tools and scripts can be used to automate the deployment to each ring, ensuring a consistent and reliable process.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Continuous monitoring:&lt;/strong&gt; A robust monitoring system can track performance, user feedback and any anomalies. This allows you to swiftly detect and resolve issues, ensuring a seamless user experience.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Having rollback plans in case of failure:&lt;/strong&gt; Issues can still arise after the test ring deployment. Having a rollback plan in place allows teams to quickly revert to a previous version of the software if necessary, minimizing the impact on users.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Communicating with users in different rings:&lt;/strong&gt; Keep users in each ring informed about the deployment process, including any known issues and expected timelines. This helps manage expectations and ensures that users are prepared for any changes.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Following up with a user sentiment survey:&lt;/strong&gt; Early users are invaluable, offering insights that can drive significant refinements. By actively engaging with user feedback via a user survey, teams can pinpoint issues, address bugs and uncover areas for improvement that may not have been evident during the deployment process.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Key benefits of using ring deployment&lt;/h2&gt;

&lt;h3&gt;Reduces risk&lt;/h3&gt;

&lt;p&gt;One of the primary benefits of ring deployment is the ability to catch and resolve issues early in the deployment process. By starting with a small group of users, teams can identify and address critical bugs and performance issues before they affect the entire user base, allowing for seamless facilitation of continuous improvement. This iterative process enables teams to make rapid adjustments and enhancements, ensuring that the final version of deployed patches aligns perfectly with the needs and expectations of broader user bases.&lt;/p&gt;

&lt;h3&gt;Improves user experience&lt;/h3&gt;

&lt;p&gt;By testing new patches with smaller groups, teams can gather valuable feedback and make necessary adjustments. Any errors that might occur with releases are caught and iterated upon before they can interrupt the majority of users.&lt;/p&gt;

&lt;h3&gt;Avoids major disruptions&lt;/h3&gt;

&lt;p&gt;Ring-based deployment not only reduces user disruption but also keeps productivity flowing during updates. By introducing changes gradually, users are less likely to be to be caught off guard by sudden, major shifts that could derail their workflows. This methodical, controlled rollout guarantees a smoother transition, keeping downtime and frustration to a minimum. Users can acclimate to new features and updates at a comfortable pace, which is especially crucial in enterprise settings where stability and reliability are non-negotiable.&lt;/p&gt;

&lt;h3&gt;Supports iterative improvements&lt;/h3&gt;

&lt;p&gt;Ring deployment supports continuous improvement by letting teams gather feedback from users at each stage of the rollout. This feedback can be used to make iterative improvements, ensuring that the final update meets user needs and expectations.&lt;/p&gt;

&lt;h2&gt;Why ring deployment is a smart choice&lt;/h2&gt;

&lt;p&gt;A ring-based deployment strategy can help organizations achieve a smoother and more stable deployment process, ultimately leading to better software and happier users. If your organization is looking to adopt ring deployment, start by defining your rings, automating the deployment process and maintaining effective communication with users. With careful planning and execution, ring deployment can become a valuable part of your IT and software development strategy.&lt;/p&gt;
</description><pubDate>Tue, 22 Apr 2025 19:06:30 Z</pubDate></item><item><guid isPermaLink="false">9933c7b4-38db-4e37-9af3-cdce170e5851</guid><link>https://www.ivanti.com/blog/april-2025-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Management</category><category>Patch Tuesday</category><category>Security</category><title>April 2025 Patch Tuesday</title><description>&lt;p&gt;April Patch Tuesday appears to be a high count of resolved CVEs, but a low number of high priority risks. Microsoft has resolved 121 new unique CVEs this month, 11 of which are rated critical and one known to be exploited. The zero-day vulnerability is in the Windows OS this month, making that your top priority.&lt;/p&gt;

&lt;p&gt;In addition, Adobe has released 12 updates resolving 54 CVEs. Adobe ColdFusion was rated highest (Priority 1) and resolves 15 CVEs. Adobe Commerce and Experience Manager Forms were rated Priority 2 and resolved five CVEs and two CVEs respectively. The rest of the Adobe lineup was Priority 3.&lt;/p&gt;

&lt;p&gt;Update your browsers! Google Chrome updated this Patch Tuesday resolving two additional CVEs. On April 1, both Mozilla Firefox and Google Chrome updated. Mozilla Firefox resolved eight CVEs, and Chrome resolved thirteen CVEs. Microsoft Edge (Chromium) updated on April 3 in response to the April 1 Chrome update, which means we will have an additional Edge update coming later this week.&lt;/p&gt;

&lt;p&gt;Oracle is due to release their quarterly CPU on April 15, so keep an eye out for Oracle updates including Java, which will kick off the domino effect of alternative Java frameworks getting updates through the end of April and into early May.&lt;/p&gt;

&lt;h3&gt;Microsoft exploited vulnerabilities&lt;/h3&gt;

&lt;p&gt;Microsoft resolved an Elevation of Privilege vulnerability in Windows Common Log File System Driver (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29824" target="_blank" rel="noopener"&gt;CVE-2025-29824&lt;/a&gt;) that could allow an attacker to gain SYSTEM privileges on the affected system. The vulnerability affects all Windows OS versions. The vulnerability is confirmed to be exploited in the wild. Microsoft severity is rated as Important and has CVSS 3.1 of 7.8. Risk-based prioritization warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;h3&gt;Third-party vulnerabilities&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;Adobe released updates for most of the Creative Suite including After Effects, Animate, Bridge, Illustrator, Media Encoder, Photoshop and Premiere Pro.&lt;/li&gt;
	&lt;li&gt;Google Chrome released an update resolving two CVEs. Expect Edge to be released later this week.&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/#CriticalPatchUpdates" target="_blank" rel="noopener"&gt;Oracle’s quarterly CPU is scheduled for April 15, 2025&lt;/a&gt;. Expect updates for a number of Oracle products, but this release will also kick off the domino effect on all Java frameworks like RedHat OpenJDK, Amazon Corretto, Azul Zulu, Eclipse Adoptium, Adopt OpenJDK and others.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Ivanti security advisory&lt;/h3&gt;

&lt;p&gt;Ivanti has released one update for April Patch Tuesday resolving a total of six CVEs. The affected products include Ivanti EPM 2022 and EPM 2024. For more details you can view the updates and information provided in the &lt;a href="https://www.ivanti.com/blog/april-security-update"&gt;April Security Update on the Ivanti blog&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;April update priorities&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;The Windows OS is your top priority this month, with the only zero-day exploit reported (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29824" target="_blank" rel="noopener"&gt;CVE-2025-29824&lt;/a&gt;).&lt;/li&gt;
	&lt;li&gt;Update all of your browsers! Last week Mozilla, Chrome and Edge received updates, and an additional Chrome update was released on Patch Tuesday. If you have not already, you should consider moving browser updates to a weekly cadence to reduce exposure time, as Chrome and Edge will receive weekly updates, and Firefox typically has two to three updates per month.&lt;/li&gt;
	&lt;li&gt;Expect Oracle updates on April 15 and additional updates for Java frameworks over the next few weeks.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 08 Apr 2025 21:19:58 Z</pubDate></item></channel></rss>