<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Security Advisory</title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/blog/topics/security-advisory/rss" /><link>https://www.ivanti.com/blog/topics/security-advisory</link><item><guid isPermaLink="false">bb18f48d-02e3-4447-ae10-01f3dd87efd8</guid><link>https://www.ivanti.com/blog/april-2026-security-update</link><category>Security Advisory</category><title>April 2026 Security Update</title><description>&lt;p&gt;Ivanti releases standard security patches on the second Tuesday of every month. &amp;nbsp;Our vulnerability management program is central to our commitment to maintaining secure products. Our philosophy is simple: discovering and communicating vulnerabilities, and sharing that information with defenders, is not an indication of weakness; rather it is evidence of rigorous scrutiny and a proactive vulnerability management program. By aggressively seeking to identify and address vulnerabilities, our aim is to get ahead of threat actors to ensure our customers can take the steps needed to protect their environments.&lt;/p&gt;

&lt;p&gt;We believe that responsible transparency helps protect our customers, and that CVE disclosures are an essential and effective tool to communicate software vulnerabilities. The purpose of assigning a CVE is to provide a beacon to security teams and signal the need for urgent updates.&lt;/p&gt;

&lt;p&gt;To that end, today Ivanti is disclosing vulnerabilities in Ivanti Neurons for ITSM (on-premises and cloud).&lt;/p&gt;

&lt;p&gt;&lt;span&gt;&lt;b&gt;It is important for customers to know:&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;We have no evidence of these vulnerabilities being exploited in the wild.&lt;/li&gt;
	&lt;li&gt;These vulnerabilities do not impact any other Ivanti solutions.&lt;/li&gt;
	&lt;li&gt;Customers using the cloud version of Ivanti Neurons for ITSM do not need to take any action as the fix was applied on 12 December 2025 to all cloud environments.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;More information on these vulnerabilities and detailed instructions on how to remediate the issues can be found in this &lt;a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Neurons-for-ITSM-CVE-2026-4913-CVE-2026-4914" target="_blank"&gt;Security Advisory&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Want to stay up to date on Ivanti Security Advisories? Paste &lt;a href="https://www.ivanti.com/blog/topics/security-advisory"&gt;https://www.ivanti.com/blog/topics/security-advisory/rss&lt;/a&gt; into your preferred RSS reader / functionality in your email program.&lt;/em&gt;&lt;/p&gt;
</description><pubDate>Tue, 14 Apr 2026 14:08:24 Z</pubDate></item><item><guid isPermaLink="false">1bc1b6b1-a480-4f6a-88b0-749da8241d7d</guid><link>https://www.ivanti.com/blog/march-2026-security-update</link><category>Security Advisory</category><title>March 2026 Security Update</title><description>&lt;p&gt;Ivanti releases standard security patches on the second Tuesday of every month. &amp;nbsp;Our vulnerability management program is central to our commitment to maintaining secure products. Our philosophy is simple: discovering and communicating vulnerabilities, and sharing that information with defenders, is not an indication of weakness; rather it is evidence of rigorous scrutiny and a proactive vulnerability management program. By aggressively seeking to identify and address vulnerabilities, our aim is to get ahead of threat actors to ensure our customers can take the steps needed to protect their environments.&lt;/p&gt;

&lt;p&gt;We believe that responsible transparency helps protect our customers, and that CVE disclosures are an essential and effective tool to communicate software vulnerabilities. The purpose of assigning a CVE is to provide a beacon to security teams and signal the need for urgent updates.&lt;/p&gt;

&lt;p&gt;To that end, today Ivanti is disclosing vulnerabilities in Ivanti Desktop and Server Management (DSM).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;span&gt;It is important for customers to know:&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;We have no evidence of this vulnerability being exploited in the wild.&lt;/li&gt;
	&lt;li&gt;This vulnerability does not impact any other Ivanti solutions.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;More information on this vulnerability and detailed instructions on how to remediate the issues can be found in this &lt;a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-DSM-CVE-2026-3483" target="_blank"&gt;Security Advisory&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Our Support team is always available to help customers and partners should they have any questions. Cases can be logged via the &lt;a href="https://hub.ivanti.com/" target="_blank"&gt;Ivanti Innovators Hub&lt;/a&gt; (login credentials required).&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Want to stay up to date on Ivanti Security Advisories? Paste &lt;a href="https://www.ivanti.com/blog/topics/security-advisory"&gt;https://www.ivanti.com/blog/topics/security-advisory/rss&lt;/a&gt; into your preferred RSS reader / functionality in your email program.&lt;/em&gt;&lt;/p&gt;
</description><pubDate>Tue, 10 Mar 2026 14:13:58 Z</pubDate></item><item><guid isPermaLink="false">0cda8b94-e9d7-478c-9f58-afc9c44664fe</guid><link>https://www.ivanti.com/blog/february-2026-security-update</link><category>Security Advisory</category><title>February 2026 Security Update</title><description>&lt;p&gt;Ivanti releases standard security patches on the second Tuesday of every month. &amp;nbsp;Our vulnerability management program is central to our commitment to maintaining secure products. Our philosophy is simple: discovering and communicating vulnerabilities, and sharing that information with defenders, is not an indication of weakness; rather it is evidence of rigorous scrutiny and a proactive vulnerability management program. By aggressively seeking to identify and address vulnerabilities, our aim is to get ahead of threat actors to ensure our customers can take the steps needed to protect their environments.&lt;/p&gt;

&lt;p&gt;We believe that responsible transparency helps protect our customers, and that CVE disclosures are an essential and effective tool to communicate software vulnerabilities. The purpose of assigning a CVE is to provide a beacon to security teams and signal the need for urgent updates.&lt;/p&gt;

&lt;p&gt;To that end, today Ivanti is disclosing vulnerabilities in Ivanti Endpoint Manager (EPM).&lt;/p&gt;

&lt;p&gt;&lt;span&gt;&lt;b&gt;It is important for customers to know:&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;We have no evidence of this vulnerability being exploited in the wild.&lt;/li&gt;
	&lt;li&gt;This vulnerability does not impact any other Ivanti solutions.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;More information on this vulnerability and detailed instructions on how to remediate the issues can be found in this &lt;a href="https://forums.ivanti.com/s/article/Security-Advisory-EPM-February-2026-for-EPM-2024" target="_blank"&gt;Security Advisory&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Our Support team is always available to help customers and partners should they have any questions. Cases can be logged via the &lt;a href="https://hub.ivanti.com/" target="_blank"&gt;Ivanti Innovators Hub&lt;/a&gt; (login credentials required).&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Want to stay up to date on Ivanti Security Advisories? Paste &lt;a href="https://www.ivanti.com/blog/topics/security-advisory"&gt;https://www.ivanti.com/blog/topics/security-advisory/rss&lt;/a&gt; into your preferred RSS reader / functionality in your email program.&lt;/em&gt;&lt;/p&gt;
</description><pubDate>Tue, 10 Feb 2026 15:05:16 Z</pubDate></item><item><guid isPermaLink="false">43dda94c-f09c-472c-a7a4-ab75944d5b69</guid><link>https://www.ivanti.com/blog/january-2026-epmm-security-update</link><category>Security Advisory</category><title>January 2026 EPMM Security Update</title><description>&lt;p&gt;At Ivanti, responsible transparency is a cornerstone of our commitment to customer security and trust. We have a long-standing commitment to provide information that allows our customers and the broader security ecosystem to take proactive measures to safeguard their environments, while mitigating the risks of a rapidly evolving and highly sophisticated threat landscape.&lt;/p&gt;

&lt;p&gt;To this end, we are issuing an important security update addressing vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM). More information can be found in the Security Advisory. At the time of disclosure, we are aware of a very limited number of customers whose solution has been exploited.&lt;/p&gt;

&lt;p&gt;The issue affects only the on-prem EPMM product. It is not present in Ivanti Neurons for MDM, Ivanti’s cloud-based unified endpoint management solution, Ivanti EPM (a similarly named, but different product), Ivanti Sentry, or any other Ivanti products.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;We urge all customers using the on-prem EPMM product to promptly install the Security Update. &lt;/u&gt;&lt;/p&gt;

&lt;p&gt;As we respond to this situation, we are making the following information available to defenders now:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Our &lt;a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340" target="_blank"&gt;Security Advisory&lt;/a&gt;, which describes the nature of the vulnerabilities and detailed remediation instructions for customers.&lt;/li&gt;
	&lt;li&gt;A &lt;a href="https://forums.ivanti.com/s/article/Analysis-Guidance-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340" target="_blank"&gt;Technical Analysis&lt;/a&gt; that includes affected endpoint specifics and log analysis guidance to support investigation and forensics.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We have a longstanding commitment to responsibly share information through Ivanti channels, as well as through coordination with government agencies and trusted security partners, to help defenders assess risk, prioritize remediation, and deploy defenses effectively. In this case, we determined that early proactive release of technical details concurrent with the patch aligns with responsible disclosure and arms defenders to best mitigate potential exploitation.&lt;/p&gt;

&lt;p&gt;Our Support team is always available to help customers and partners should they have any questions. Cases can be logged via the &lt;a href="https://success.ivanti.com/" target="_blank"&gt;Success portal&lt;/a&gt; (login credentials required).&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Want to stay up to date on Ivanti Security Advisories? Paste &lt;a href="https://www.ivanti.com/blog/topics/security-advisory"&gt;https://www.ivanti.com/blog/topics/security-advisory/rss&lt;/a&gt; into your preferred RSS reader / functionality in your email program.&lt;/em&gt;&lt;/p&gt;
</description><pubDate>Thu, 29 Jan 2026 19:05:22 Z</pubDate></item><item><guid isPermaLink="false">d3c4d335-4c29-435e-ac7f-405e86cf33cc</guid><link>https://www.ivanti.com/blog/december-2025-security-update</link><category>Security Advisory</category><title>December 2025 Security Update</title><description>&lt;p&gt;Ivanti releases standard security patches on the second Tuesday of every month.&amp;nbsp; Our vulnerability management program is central to our commitment to maintaining secure products. Our philosophy is simple: discovering and communicating vulnerabilities, and sharing that information with defenders, is not an indication of weakness; rather it is evidence of rigorous scrutiny and a proactive vulnerability management program. By aggressively seeking to identify and address vulnerabilities, our aim is to get ahead of threat actors to ensure our customers can take the steps needed to protect their environments.&lt;/p&gt;

&lt;p&gt;We believe that responsible transparency helps protect our customers, and that CVE disclosures are an essential and effective tool to communicate software vulnerabilities. The purpose of assigning a CVE is to provide a beacon to security teams and signal the need for urgent updates.&lt;/p&gt;

&lt;p&gt;To that end, today Ivanti is disclosing vulnerabilities in Ivanti Endpoint Manager (EPM).&lt;/p&gt;

&lt;p&gt;&lt;span&gt;It is important for customers to know:&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;We have no evidence of this vulnerability being exploited in the wild.&lt;/li&gt;
	&lt;li&gt;This vulnerability does not impact any other Ivanti solutions.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;More information on this vulnerability and detailed instructions on how to remediate the issues can be found in this &lt;a href="https://forums.ivanti.com/s/article/Security-Advisory-EPM-December-2025-for-EPM-2024" target="_blank"&gt;Security Advisory&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Our Support team is always available to help customers and partners should they have any questions. Cases can be logged via the &lt;a href="https://success.ivanti.com/" target="_blank"&gt;Success portal&lt;/a&gt; (login credentials required).&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Want to stay up to date on Ivanti Security Advisories? Paste &lt;a href="https://www.ivanti.com/blog/topics/security-advisory"&gt;https://www.ivanti.com/blog/topics/security-advisory/rss&lt;/a&gt; into your preferred RSS reader / functionality in your email program.&lt;/em&gt;&lt;/p&gt;
</description><pubDate>Tue, 09 Dec 2025 16:11:25 Z</pubDate></item><item><guid isPermaLink="false">b14d098a-fef6-4307-a3c8-c508857c1c0d</guid><link>https://www.ivanti.com/blog/november-2025-security-update</link><category>Security Advisory</category><title>November 2025 Security Update</title><description>&lt;p&gt;Ivanti releases standard security patches on the second Tuesday of every month. &amp;nbsp;Our vulnerability management program is central to our commitment to maintaining secure products. Our philosophy is simple: discovering and communicating vulnerabilities, and sharing that information with defenders, is not an indication of weakness; rather it is evidence of rigorous scrutiny and a proactive vulnerability management program. By aggressively seeking to identify and address vulnerabilities, our aim is to get ahead of threat actors to ensure our customers can take the steps needed to protect their environments.&lt;/p&gt;

&lt;p&gt;We believe that responsible transparency helps protect our customers, and that CVE disclosures are an essential and effective tool to communicate software vulnerabilities. The purpose of assigning a CVE is to provide a beacon to security teams and signal the need for urgent updates.&lt;/p&gt;

&lt;p&gt;To that end, today Ivanti is disclosing a vulnerability in Ivanti Endpoint Manager (EPM).&lt;/p&gt;

&lt;p&gt;&lt;span&gt;It is important for customers to know:&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;We have no evidence of this vulnerability being exploited in the wild.&lt;/li&gt;
	&lt;li&gt;This vulnerability does not impact any other Ivanti solutions.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;More information on this vulnerability and detailed instructions on how to remediate the issues can be found in this &lt;a href="https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2025-for-EPM-2024" target="_blank"&gt;Security Advisory&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Our Support team is always available to help customers and partners should they have any questions. Cases can be logged via the &lt;a href="https://success.ivanti.com/" target="_blank"&gt;Success portal&lt;/a&gt; (login credentials required).&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Want to stay up to date on Ivanti Security Advisories? Paste &lt;a href="https://www.ivanti.com/blog/topics/security-advisory"&gt;https://www.ivanti.com/blog/topics/security-advisory/rss&lt;/a&gt; into your preferred RSS reader / functionality in your email program.&lt;/em&gt;&lt;/p&gt;
</description><pubDate>Tue, 11 Nov 2025 15:12:04 Z</pubDate></item><item><guid isPermaLink="false">6c83705e-b3f7-4d2f-af07-1be17da7e339</guid><link>https://www.ivanti.com/blog/october-2025-security-update</link><category>Security Advisory</category><title>October 2025 Security Update</title><description>&lt;p&gt;Ivanti releases standard security patches on the second Tuesday of every month.&amp;nbsp; Our vulnerability management program is central to our commitment to maintaining secure products. Our philosophy is simple: discovering and communicating vulnerabilities, and sharing that information with defenders, is not an indication of weakness; rather it is evidence of rigorous scrutiny and a proactive vulnerability management program. By aggressively seeking to identify and address vulnerabilities, our aim is to get ahead of threat actors to ensure our customers can take the steps needed to protect their environments.&lt;/p&gt;

&lt;p&gt;We believe that responsible transparency helps protect our customers, and that CVE disclosures are an essential and effective tool to communicate software vulnerabilities. The purpose of assigning a CVE is to provide a beacon to security teams and signal the need for urgent updates.&lt;/p&gt;

&lt;p&gt;To that end, today Ivanti is disclosing vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM) and Neurons for MDM.&lt;/p&gt;

&lt;p&gt;More information on these vulnerabilities and detailed instructions on how to remediate the issues can be found in these Security Advisories:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://forums.ivanti.com/s/article/Security-Advisory-Endpoint-Manager-Mobile-EPMM-10-2025-Multiple-CVEs?language=en_US" target="_blank"&gt;Ivanti Endpoint Manager Mobile (EPMM)&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://forums.ivanti.com/s/article/October-2025-Security-Advisory-Ivanti-Neurons-for-MDM" target="_blank"&gt;Ivanti Neurons for MDM&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In addition, Ivanti has issued a &lt;a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-EPM-October-2025" target="_blank"&gt;Security Advisory for Ivanti Endpoint Manager&lt;/a&gt;, which provides mitigation options for vulnerabilities disclosed October 7, 2025. &amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;It is important for customers to know:&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;We have no evidence of any of these vulnerabilities being exploited in the wild.&lt;/li&gt;
	&lt;li&gt;These vulnerabilities do not impact any other Ivanti solutions.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Our Support team is always available to help customers and partners should they have any questions. Cases can be logged via the &lt;a href="https://success.ivanti.com/" target="_blank"&gt;Success portal&lt;/a&gt; (login credentials required).&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Want to stay up to date on Ivanti Security Advisories? Paste &lt;a href="https://www.ivanti.com/blog/topics/security-advisory"&gt;https://www.ivanti.com/blog/topics/security-advisory/rss&lt;/a&gt; into your preferred RSS reader / functionality in your email program.&lt;/em&gt;&lt;/p&gt;
</description><pubDate>Tue, 14 Oct 2025 14:20:14 Z</pubDate></item><item><guid isPermaLink="false">f6a082d9-98ad-4456-8bb3-dcd1c2f45fb6</guid><link>https://www.ivanti.com/blog/september-2025-security-update</link><category>Security Advisory</category><title>September 2025 Security Update</title><description>&lt;p&gt;Ivanti releases standard security patches on the second Tuesday of every month.&amp;nbsp; Our vulnerability management program is central to our commitment to maintaining secure products. Our philosophy is simple: discovering and communicating vulnerabilities, and sharing that information with defenders, is not an indication of weakness; rather it is evidence of rigorous scrutiny and a proactive vulnerability management program. By aggressively seeking to identify and address vulnerabilities, our aim is to get ahead of threat actors to ensure our customers can take the steps needed to protect their environments. At the core, we believe that responsible transparency helps protect our customers.&lt;/p&gt;

&lt;p&gt;We believe that responsible transparency helps protect our customers, and that CVE disclosures are an essential and effective tool to communicate software vulnerabilities. The purpose of assigning a CVE is to provide a beacon to security teams and signal the need for urgent updates.&lt;/p&gt;

&lt;p&gt;To that end, today Ivanti is disclosing vulnerabilities in Ivanti Endpoint Manager (EPM) and Ivanti Connect Secure, Policy Secure, ZTA Gateways and Neurons for Secure Access.&lt;/p&gt;

&lt;p&gt;&lt;span&gt;It is important for customers to know:&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;We have no evidence of any of these vulnerabilities being exploited in the wild.&lt;/li&gt;
	&lt;li&gt;These vulnerabilities do not impact any other Ivanti solutions.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;More information on these vulnerabilities and detailed instructions on how to remediate the issues can be found in these Security Advisories:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://forums.ivanti.com/s/article/Security-Advisory-September-2025-for-Ivanti-EPM-2024-SU3-and-EPM-2022-SU8" target="_blank"&gt;Ivanti Endpoint Manager (EPM)&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://forums.ivanti.com/s/article/September-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-and-Neurons-for-Secure-Access-Multiple-CVEs" target="_blank"&gt;Ivanti Connect Secure, Policy Secure, ZTNA and nSA&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Our Support team is always available to help customers and partners should they have any questions. Cases can be logged via the &lt;a href="https://success.ivanti.com/" target="_blank"&gt;Success portal&lt;/a&gt; (login credentials required).&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Want to stay up to date on Ivanti Security Advisories? Paste &lt;a href="https://www.ivanti.com/blog/topics/security-advisory"&gt;https://www.ivanti.com/blog/topics/security-advisory/rss&lt;/a&gt; into your preferred RSS reader / functionality in your email program.&lt;/em&gt;&lt;/p&gt;
</description><pubDate>Tue, 09 Sep 2025 14:16:12 Z</pubDate></item><item><guid isPermaLink="false">9e7807bc-1f70-4a3f-9e21-bdd705346407</guid><link>https://www.ivanti.com/blog/august-2025-security-update</link><category>Security Advisory</category><title>August 2025 Security Update</title><description>&lt;p&gt;Ivanti releases standard security patches on the second Tuesday of every month. &amp;nbsp;Our vulnerability management program is central to our commitment to maintaining secure products. Our philosophy is simple: discovering and communicating vulnerabilities, and sharing that information with defenders, is not an indication of weakness; rather it is evidence of rigorous scrutiny and a proactive vulnerability management program. By aggressively seeking to identify and address vulnerabilities, our aim is to get ahead of threat actors to ensure our customers can take the steps needed to protect their environments. At the core, we believe that responsible transparency helps protect our customers.&lt;/p&gt;

&lt;p&gt;We believe that responsible transparency helps protect our customers, and that CVE disclosures are an essential and effective tool to communicate software vulnerabilities. The purpose of assigning a CVE is to provide a beacon to security teams and signal the need for urgent updates.&lt;/p&gt;

&lt;p&gt;To that end, today Ivanti is disclosing vulnerabilities in Ivanti Avalanche, Ivanti Virtual Application Delivery Control (vADC) (previously known as vTM) and Ivanti Connect Secure, Policy Secure, ZTA Gateways and Neurons for Secure Access.&lt;/p&gt;

&lt;p&gt;&lt;span&gt;It is important for customers to know:&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;We have no evidence of any of these vulnerabilities being exploited in the wild.&lt;/li&gt;
	&lt;li&gt;These vulnerabilities do not impact any other Ivanti solutions.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;More information on these vulnerabilities and detailed instructions on how to remediate the issues can be found in these Security Advisories:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Avalanche-CVE-2025-8296-CVE-2025-8297" target="_blank"&gt;Ivanti Avalanche&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://forums.ivanti.com/s/article/August-Security-Advisory-Ivanti-Virtual-Application-Delivery-Controller-vADC-previously-vTM-CVE-2025-8310" target="_blank"&gt;Ivanti vADC&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://forums.ivanti.com/s/article/August-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-Multiple-CVEs" target="_blank"&gt;Ivanti Connect Secure, Policy Secure, ZTA Gateways&amp;nbsp;and Neurons for Secure Access&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Our Support team is always available to help customers and partners should they have any questions. Cases can be logged via the &lt;a href="https://success.ivanti.com/" target="_blank"&gt;Success portal&lt;/a&gt; (login credentials required).&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Want to stay up to date on Ivanti Security Advisories? Paste &lt;a href="https://www.ivanti.com/blog/topics/security-advisory"&gt;https://www.ivanti.com/blog/topics/security-advisory/rss&lt;/a&gt; into your preferred RSS reader / functionality in your email program.&lt;/em&gt;&lt;/p&gt;
</description><pubDate>Tue, 12 Aug 2025 14:16:05 Z</pubDate></item><item><guid isPermaLink="false">ab3d75ba-d2f9-489f-a4fe-58ac719c6455</guid><link>https://www.ivanti.com/blog/july-security-update-2025</link><category>Security Advisory</category><title>July Security Update</title><description>&lt;p&gt;Ivanti releases standard security patches on the second Tuesday of every month.&amp;nbsp; Our vulnerability management program is central to our commitment to maintaining secure products.&amp;nbsp;Our philosophy is simple: discovering and communicating vulnerabilities, and sharing that information with defenders, is not an indication of weakness; rather it is evidence of rigorous scrutiny and a proactive vulnerability management program. By aggressively seeking to identify and address vulnerabilities, our aim is to get ahead of threat actors to ensure our customers can take the steps needed to protect their environments.&lt;/p&gt;

&lt;p&gt;We believe that responsible transparency helps protect our customers, and that CVE disclosures are an essential and effective tool to communicate software vulnerabilities. The purpose of assigning a CVE is to provide a beacon to security teams and signal the need for urgent updates.&lt;/p&gt;

&lt;p&gt;To that end, today Ivanti is disclosing vulnerabilities in Ivanti Connect Secure and Policy Secure, Ivanti EPM, and Ivanti EPMM.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;It is important for customers to know:&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;We have no evidence of any of these vulnerabilities being exploited in the wild.&lt;/li&gt;
	&lt;li&gt;These vulnerabilities do not impact any other Ivanti solutions.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;More information on these vulnerabilities and detailed instructions on how to remediate the issues can be found in these Security Advisories:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://forums.ivanti.com/s/article/July-Security-Advisory-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Multiple-CVEs" target="_blank"&gt;Ivanti Connect Secure and Policy Secure&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2025-6770-CVE-2025-6771" target="_blank"&gt;Ivanti EPMM&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://forums.ivanti.com/s/article/Security-Advisory-July-2025-for-Ivanti-EPM-2024-SU2-and-EPM-2022-SU8" target="_blank"&gt;Ivanti EPM&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Our Support team is always available to help customers and partners should they have any questions. Cases can be logged via the &lt;a href="https://success.ivanti.com/" target="_blank"&gt;Success portal&lt;/a&gt; (login credentials required).&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Want to stay up to date on Ivanti Security Advisories? Paste &lt;a href="https://www.ivanti.com/blog/topics/security-advisory"&gt;https://www.ivanti.com/blog/topics/security-advisory/rss&lt;/a&gt; into your preferred RSS reader / functionality in your email program.&lt;/em&gt;&lt;/p&gt;
</description><pubDate>Tue, 08 Jul 2025 14:45:10 Z</pubDate></item><item><guid isPermaLink="false">52882483-4dbe-4b07-ad9d-999d081a2233</guid><link>https://www.ivanti.com/blog/june-security-update</link><category>Security Advisory</category><title>June Security Update</title><description>&lt;p&gt;Ivanti releases standard security patches on the second Tuesday of every month. It is our philosophy that responsible transparency helps protect our customers. CVE disclosures are an essential and effective tool for communicating software vulnerabilities and necessary actions to customers. A CVE serves as a beacon to security teams and signals the need for urgent updates. &amp;nbsp;&lt;/p&gt;

&lt;p&gt;Today, Ivanti is disclosing vulnerabilities in Ivanti Workspace Control.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;It is important for customers to know:&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;We have no evidence of any of these vulnerabilities being exploited in the wild.&lt;/li&gt;
	&lt;li&gt;These vulnerabilities do not impact any other Ivanti solutions.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;More information on these vulnerabilities and detailed instructions on how to remediate the issues can be found in these Security Advisories:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Workspace-Control-CVE-2025-5353-CVE-CVE-2025-22463-CVE-2025-22455" target="_blank"&gt;Ivanti Workspace Control (IWC)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Our Support team is always available to help customers and partners should they have any questions. Cases can be logged via the &lt;a href="https://success.ivanti.com/" target="_blank"&gt;Success portal&lt;/a&gt; (login credentials required).&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Want to stay up to date on Ivanti Security Advisories? Paste &lt;a href="https://www.ivanti.com/blog/topics/security-advisory"&gt;https://www.ivanti.com/blog/topics/security-advisory/rss&lt;/a&gt; into your preferred RSS reader / functionality in your email program.&lt;/em&gt;&lt;/p&gt;
</description><pubDate>Tue, 10 Jun 2025 14:06:36 Z</pubDate></item><item><guid isPermaLink="false">6ff2c0c7-08d8-44b9-9420-2d4113224412</guid><link>https://www.ivanti.com/blog/may-2025-security-update</link><category>Security Advisory</category><title>May Security Update</title><description>&lt;p&gt;Ivanti releases standard security patches on the second Tuesday of every month. For many of our customers, the predictable schedule facilitates better planning and management of IT resources, allowing them to allocate time and personnel efficiently for the timely updates.&lt;/p&gt;

&lt;p&gt;Today, Ivanti is disclosing vulnerabilities in Ivanti ITSM (on-premises only), Cloud Security Application (CSA) and Neurons for MDM.&lt;/p&gt;

&lt;p&gt;&lt;span&gt;It is important for customers to know:&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;We have no evidence of any of these vulnerabilities being exploited in the wild.&lt;/li&gt;
	&lt;li&gt;These vulnerabilities do not impact any other Ivanti solutions.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;More information on these vulnerabilities and detailed instructions on how to remediate the issues can be found in these Security Advisories:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Neurons-for-ITSM-on-premises-only-CVE-2025-22462" target="_blank"&gt;Ivanti Neurons for ITSM (on-premises only)&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Cloud-Services-Application-CVE-2025-22460" target="_blank"&gt;Cloud Security Application (CSA)&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://forums.ivanti.com/s/article/Security-Advisory-May-2025-Ivanti-Neurons-for-MDM-N-MDM" target="_blank"&gt;Ivanti Neurons for MDM&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Our Support team is always available to help customers and partners should they have any questions. Cases can be logged via the &lt;a href="https://success.ivanti.com/" target="_blank"&gt;Success portal&lt;/a&gt; (login credentials required).&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Want to stay up to date on Ivanti Security Advisories? Paste &lt;a href="https://www.ivanti.com/blog/topics/security-advisory"&gt;https://www.ivanti.com/blog/topics/security-advisory/rss&lt;/a&gt; into your preferred RSS reader / functionality in your email program.&lt;/em&gt;&lt;/p&gt;
</description><pubDate>Tue, 13 May 2025 15:02:59 Z</pubDate></item><item><guid isPermaLink="false">decc6d13-1d63-4712-8f32-bac883ee7f60</guid><link>https://www.ivanti.com/blog/epmm-security-update</link><category>Security Advisory</category><title>EPMM Security Update</title><description>&lt;p&gt;At Ivanti, transparency is a cornerstone of our commitment to customer security and trust. It is through such transparency that vulnerabilities are swiftly addressed, allowing our customers and the broader ecosystem to take proactive measures to safeguard their environments amidst a rapidly evolving and highly sophisticated threat landscape.&lt;/p&gt;

&lt;p&gt;To this end, we are issuing an important security update addressing vulnerabilities associated with open-source libraries used in Ivanti Endpoint Manager Mobile (EPMM). We have provided an FAQ below and in the &lt;a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM" target="_blank"&gt;Security Advisory&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;At the time of disclosure, we are aware of a very limited number of customers whose solution has been exploited.&lt;/p&gt;

&lt;p&gt;The issue only affects the on-prem EPMM product. It is not present in Ivanti Neurons for MDM, Ivanti’s cloud-based unified endpoint management solution, Ivanti Sentry, or any other Ivanti products.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;We urge all customers using the on-prem EPMM product to promptly install the patch.&lt;/u&gt;&lt;/p&gt;

&lt;p&gt;We have made additional resources and support teams available to assist customers in implementing the patch and addressing any concerns. Detailed information is available in our Security Advisory so that customers can protect their environment.&lt;/p&gt;

&lt;p&gt;Thank you to our customers and security partners for their engagement and support, which enabled our swift response to this issue. We remain committed to continuously improving our products and processes through collaboration and transparency with our stakeholders and the broader security ecosystem.&lt;/p&gt;

&lt;p&gt;Our Support team is always available to help customers and partners should they have any questions. Cases can be logged via the &lt;a href="https://success.ivanti.com/" target="_blank"&gt;Success portal&lt;/a&gt; (login credentials required).&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Want to stay up to date on Ivanti Security Advisories? Paste &lt;a href="https://www.ivanti.com/blog/topics/security-advisory"&gt;https://www.ivanti.com/blog/topics/security-advisory/rss&lt;/a&gt; into your preferred RSS reader / functionality in your email program.&lt;/em&gt;&lt;/p&gt;
</description><pubDate>Tue, 13 May 2025 14:05:45 Z</pubDate></item><item><guid isPermaLink="false">551a890c-a769-44cc-b35c-8c31702a63f9</guid><link>https://www.ivanti.com/blog/april-security-update</link><category>Security Advisory</category><title>April Security Update</title><description>&lt;p&gt;Ivanti’s vulnerability management program is a central part of our commitment to security. We employ rigorous testing and validation methodologies to enable swift identification, patching, and disclosure of vulnerabilities in collaboration with the broader security ecosystem. Our priority is to provide responsible and transparent communication to our customers, so they are empowered to defend their environments.&lt;/p&gt;

&lt;p&gt;In recent months, we have intensified our internal scanning, manual exploitation and testing capabilities, and have also made enhancements to our responsible disclosure process so that we promptly discover and address potential issues, and so that our customers are best equipped to take action.&lt;/p&gt;

&lt;p&gt;Ivanti releases standard security patches on the second Tuesday of every month. For many of our customers, the predictable schedule facilitates better planning and management of IT resources, allowing them to allocate time and personnel efficiently for the timely updates.&lt;/p&gt;

&lt;p&gt;Today, Ivanti is disclosing vulnerabilities in Ivanti Endpoint Manager (EPM).&lt;/p&gt;

&lt;p&gt;&lt;span&gt;It is important for customers to know:&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;We have no evidence of any of these vulnerabilities being exploited in the wild.&lt;/li&gt;
	&lt;li&gt;These vulnerabilities do not impact any other Ivanti solutions.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;More information on these vulnerabilities and detailed instructions on how to remediate the issues can be found in these &lt;a href="https://forums.ivanti.com/s/article/Security-Advisory-EPM-April-2025-for-EPM-2024-and-EPM-2022-SU6" target="_blank"&gt;Security Advisory&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Our Support team is always available to help customers and partners should they have any questions. Cases can be logged via the &lt;a href="https://success.ivanti.com/" target="_blank"&gt;Success portal&lt;/a&gt; (login credentials required).&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Want to stay up to date on Ivanti Security Advisories? Paste &lt;a href="https://www.ivanti.com/blog/topics/security-advisory"&gt;https://www.ivanti.com/blog/topics/security-advisory/rss&lt;/a&gt; into your preferred RSS reader / functionality in your email program.&lt;/em&gt;&lt;/p&gt;
</description><pubDate>Tue, 08 Apr 2025 14:07:40 Z</pubDate></item><item><guid isPermaLink="false">8603d50f-cd53-4769-8cee-8e7688dba14f</guid><link>https://www.ivanti.com/blog/security-update-pulse-connect-secure-ivanti-connect-secure-policy-secure-and-neurons-for-zta-gateways</link><category>Security Advisory</category><title>Security Update: Pulse Connect Secure, Ivanti Connect Secure, Policy Secure and Neurons for ZTA Gateways</title><description>&lt;p&gt;&lt;em&gt;** The following has been updated to make clear the vulnerability was fully patched in Ivanti Connect Secure 22.7R2.6&amp;nbsp;(released February 11, 2025).&amp;nbsp;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;At Ivanti, our mission is to empower customers to defend their environments in an evolving and increasingly sophisticated threat landscape. This includes providing industry-leading products, transparent communication, and sophisticated tools to help to protect and fortify networks. Central to this mission is a culture of transparency and responsiveness, especially when facing a security issue. This is essential for the health and security of the entire industry and the organizations we serve.&lt;/p&gt;

&lt;p&gt;To this end, we are issuing an important security update addressing a vulnerability in Pulse Connect Secure (version 9.1x, which reached end-of-support December 31, 2024), Ivanti Connect Secure (version 22.7R2.5 and earlier), Policy Secure and Neurons for ZTA gateways. We are reporting the vulnerability as CVE-2025-22457.&lt;/p&gt;

&lt;p&gt;Customers have a significantly reduced risk from this vulnerability if they are running appliances on supported versions and in accordance with Ivanti's guidance:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;This vulnerability was fully patched in Ivanti Connect Secure 22.7R2.6&lt;/strong&gt; (released February 11, 2025).&lt;/li&gt;
	&lt;li&gt;Ivanti Policy Secure should not be an internet facing solution. Users that follow Ivanti’s guidance regarding internet exposure are at a reduced risk from this vulnerability.&lt;/li&gt;
	&lt;li&gt;Neurons for ZTA gateways cannot be exploited when in production.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We are aware of a limited number of customers whose appliances have been exploited and are running Ivanti Connect Secure 22.7R2.5 or earlier or Pulse Connect Secure 9.1x.&amp;nbsp;At the time of this disclosure, we are not aware of any exploitation of this vulnerability in Ivanti Policy Secure or Neurons for ZTA gateways, which have meaningfully reduced risk from this vulnerability.&lt;/p&gt;

&lt;p&gt;Pulse Connect Secure 9.1x reached End-of-Support on December 31, 2024, and no longer receives code support or changes. Customers who have not yet migrated from this solution will need to contact Ivanti for a migration path to Ivanti Connect Secure or migrate to another secure solution to ensure their security. Ivanti always encourages customers to remain on the latest version of software so they can benefit from important security and product enhancements.&lt;/p&gt;

&lt;p&gt;We have made additional resources and support teams available to assist customers in implementing the patch and addressing any concerns. More information is available in this &lt;a href="https://forums.ivanti.com/s/article/April-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-22457" target="_blank"&gt;Security Advisory&lt;/a&gt; on the vulnerability and the nature of the threat so that customers can protect their environment.&lt;/p&gt;

&lt;p&gt;Thank you to our customers and security partners for their engagement and support, which enabled our swift detection and response to this issue. We remain committed to continuously improving our products and processes through collaboration and transparency with our stakeholders and the broader security ecosystem.&lt;/p&gt;

&lt;p&gt;Our Support team is always available to help customers and partners should they have any questions. Cases can be logged via the &lt;a href="https://success.ivanti.com/" target="_blank"&gt;Success portal&lt;/a&gt; (login credentials required).&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Want to stay up to date on Ivanti Security Advisories? Paste &lt;a href="https://www.ivanti.com/blog/topics/security-advisory"&gt;https://www.ivanti.com/blog/topics/security-advisory/rss&lt;/a&gt; into your preferred RSS reader / functionality in your email program.&lt;/em&gt;&lt;/p&gt;
</description><pubDate>Thu, 03 Apr 2025 14:13:23 Z</pubDate></item><item><guid isPermaLink="false">451060a3-e5f4-4771-9f42-be1ecbcd7538</guid><link>https://www.ivanti.com/blog/march-security-update</link><category>Security Advisory</category><title>March Security Update</title><description>&lt;p&gt;Ivanti’s vulnerability management program is a central part of our commitment to security. We employ rigorous testing and validation methodologies to enable swift identification, patching, and disclosure of vulnerabilities in collaboration with the broader security ecosystem. Our priority is to provide responsible and transparent communication to our customers, so they are empowered to defend their environments.&lt;/p&gt;

&lt;p&gt;In recent months, we have intensified our internal scanning, manual exploitation and testing capabilities, and have also made enhancements to our responsible disclosure process so that we promptly discover and address potential issues, and so that our customers are best equipped to take action.&lt;/p&gt;

&lt;p&gt;Ivanti releases standard security patches on the second Tuesday of every month. For many of our customers, the predictable schedule facilitates better planning and management of IT resources, allowing them to allocate time and personnel efficiently for the timely updates.&lt;/p&gt;

&lt;p&gt;&lt;span&gt;It is important for customers to know:&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;We have no evidence of any of these vulnerabilities being exploited in the wild.&lt;/li&gt;
	&lt;li&gt;These vulnerabilities do not impact any other Ivanti solutions.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;More information on these vulnerabilities and detailed instructions on how to remediate the issues can be found in these Security Advisories:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://forums.ivanti.com/s/article/Security-Advisory-March-2025-Ivanti-Neurons-for-MDM-N-MDM" target="_blank"&gt;Ivanti Neurons for MDM&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://forums.ivanti.com/s/article/March-Security-Advisory-Ivanti-Secure-Access-Client-ISAC-CVE-2025-22454" target="_blank"&gt;Ivanti Secure Access Client (ISAC)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Our Support team is always available to help customers and partners should they have any questions. Cases can be logged via the &lt;a href="https://success.ivanti.com/" target="_blank"&gt;Success portal&lt;/a&gt; (login credentials required).&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Want to stay up to date on Ivanti Security Advisories? Paste &lt;a href="https://www.ivanti.com/blog/topics/security-advisory"&gt;https://www.ivanti.com/blog/topics/security-advisory/rss&lt;/a&gt; into your preferred RSS reader / functionality in your email program.&lt;/em&gt;&lt;/p&gt;
</description><pubDate>Tue, 11 Mar 2025 14:05:02 Z</pubDate></item><item><guid isPermaLink="false">cad81e22-d34b-4303-a115-4e0e4e945c60</guid><link>https://www.ivanti.com/blog/february-security-update</link><category>Security Advisory</category><title>February Security Update</title><description>&lt;p&gt;Ivanti’s vulnerability management program is a central part of our commitment to security. We employ rigorous testing and validation methodologies to enable swift identification, patching, and disclosure of vulnerabilities in collaboration with the broader security ecosystem. Our priority is to provide responsible and transparent communication to our customers, so they are empowered to defend their environments.&lt;/p&gt;

&lt;p&gt;In recent months, we have intensified our internal scanning, manual exploitation and testing capabilities, and have also made enhancements to our responsible disclosure process so that we promptly discover and address potential issues, and so that our customers are best equipped to take action.&lt;/p&gt;

&lt;p&gt;Ivanti releases standard security patches on the second Tuesday of every month. For many of our customers, the predictable schedule facilitates better planning and management of IT resources, allowing them to allocate time and personnel efficiently for the timely updates.&lt;/p&gt;

&lt;p&gt;Today, fixes have been released for the Ivanti solutions detailed below.&lt;/p&gt;

&lt;p&gt;&lt;span&gt;It is important for customers to know:&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;We have no evidence of any of these vulnerabilities being exploited in the wild.&lt;/li&gt;
	&lt;li&gt;These vulnerabilities do not impact any other Ivanti products.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;More information on these vulnerabilities and detailed instructions on how to remediate the issues can be found in these Security Advisories:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Cloud-Services-Application-CSA-CVE-2024-47908-CVE-2024-11771" target="_blank"&gt;Ivanti Cloud Service Application&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Neurons-for-MDM-N-MDM" target="_blank"&gt;Ivanti Neurons for MDM&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://forums.ivanti.com/s/article/February-Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-and-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs" target="_blank"&gt;Ivanti Connect Secure, Policy Secure and Secure Access Client&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Our Support team is always available to help customers and partners should they have any questions. Cases can be logged via the &lt;a href="https://success.ivanti.com/" target="_blank"&gt;Success portal&lt;/a&gt; (login credentials required).&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Want to stay up to date on Ivanti Security Advisories? Paste &lt;a href="https://www.ivanti.com/blog/topics/security-advisory"&gt;https://www.ivanti.com/blog/topics/security-advisory/rss&lt;/a&gt; into your preferred RSS reader / functionality in your email program.&lt;/em&gt;&lt;/p&gt;
</description><pubDate>Tue, 11 Feb 2025 15:12:43 Z</pubDate></item><item><guid isPermaLink="false">a543d794-0dcf-4388-a8d2-d406861dc405</guid><link>https://www.ivanti.com/blog/january-security-update</link><category>Security Advisory</category><title>January Security Update</title><description>&lt;p&gt;Ivanti’s vulnerability management program is a central part of our commitment to security. We employ rigorous testing and validation methodologies to enable swift identification, patching, and disclosure of vulnerabilities in collaboration with the broader security ecosystem. Our priority is to provide responsible and transparent communication to our customers, so they are empowered to defend their environments.&lt;/p&gt;

&lt;p&gt;In recent months, we have intensified our internal scanning, manual exploitation and testing capabilities, and have also made enhancements to our responsible disclosure process so that we promptly discover and address potential issues, and so that our customers are best equipped to take action.&lt;/p&gt;

&lt;p&gt;As part of this, Ivanti releases standard security patches on the second Tuesday of every month. For many of our customers, the predictable schedule facilitates better planning and management of IT resources, allowing them to allocate time and personnel efficiently for the timely updates.&lt;/p&gt;

&lt;p&gt;Today, fixes have been released for the Ivanti solutions detailed below.&lt;/p&gt;

&lt;p&gt;&lt;span&gt;It is important for customers to know:&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;We have no evidence of any of these vulnerabilities being exploited in the wild.&lt;/li&gt;
	&lt;li&gt;These vulnerabilities do not impact any other Ivanti products.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;More information on these vulnerabilities and detailed instructions on how to remediate the issues can be found in these Security Advisories:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Avalanche-6-4-7-Multiple-CVEs" target="_blank"&gt;Ivanti Avalanche&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Application-Control-Engine-CVE-2024-10630" target="_blank"&gt;Ivanti Application Control Engine&lt;/a&gt; (AC Engine is present on Ivanti Application Control, Ivanti Neurons for App Control and can integrate with Ivanti Security Controls and Ivanti Endpoint Manager).&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6" target="_blank"&gt;Ivanti EPM&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Our Support team is always available to help customers and partners should they have any questions. Cases can be logged via the &lt;a href="https://success.ivanti.com/" target="_blank"&gt;Success portal&lt;/a&gt; (login credentials required).&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Want to stay up to date on Ivanti Security Advisories? Paste &lt;a href="https://www.ivanti.com/blog/topics/security-advisory"&gt;https://www.ivanti.com/blog/topics/security-advisory/rss&lt;/a&gt; into your preferred RSS reader / functionality in your email program.&lt;/em&gt;&lt;/p&gt;
</description><pubDate>Tue, 14 Jan 2025 15:11:30 Z</pubDate></item><item><guid isPermaLink="false">7b3f547e-b3b6-4d7f-a025-fdb9e5fa4a80</guid><link>https://www.ivanti.com/blog/security-update-ivanti-connect-secure-policy-secure-and-neurons-for-zta-gateways</link><category>Security Advisory</category><title>Security Update: Ivanti Connect Secure, Policy Secure and Neurons for ZTA Gateways</title><description>&lt;p&gt;At Ivanti, our mission is to empower customers to defend their environments in an evolving and increasingly sophisticated threat landscape. This includes providing industry-leading products, transparent communication, and sophisticated tools to help to protect and fortify networks. Central to this mission is a culture of transparency and responsiveness, especially when facing a security issue. This is essential for the health and security of the entire industry and the organizations we serve.&lt;/p&gt;

&lt;p&gt;To this end, we are issuing an important security update addressing recently identified vulnerabilities for Ivanti Connect Secure, Policy Secure and Neurons for ZTA gateways. We are reporting the vulnerabilities as CVE-2025-0282 and CVE-2025-0283.&amp;nbsp;A fix is available now in our standard download portal.&lt;/p&gt;

&lt;p&gt;We are aware of a limited number of customers’ Ivanti Connect Secure appliances which have been exploited by CVE-2025-0282 at the time of disclosure. We are not aware of these CVEs being exploited in Ivanti Policy Secure or Neurons for ZTA gateways.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Threat actor activity was identified by the Integrity Checker Tool (ICT) on the same day it occurred, enabling Ivanti to respond promptly and rapidly develop a fix&lt;/strong&gt;. We continue to work closely with affected customers, external security partners, and law enforcement agencies as we respond to this threat. We strongly advise all customers to closely monitor their internal and external ICT as a part of a robust and layered approach to cybersecurity to ensure the integrity and security of the entire network infrastructure.&lt;/p&gt;

&lt;p&gt;We have made additional resources and support teams available to assist customers in implementing the patch and addressing any concerns. Information is available in this &lt;a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-0282-CVE-2025-0283" target="_blank"&gt;Security Advisory&lt;/a&gt; on how to apply the fix and the nature of the threat so that customers can protect their environment.&lt;/p&gt;

&lt;p&gt;Thank you to our customers and security partners for their engagement and support, which enabled our swift detection and response to this issue. We remain committed to continuously improving our products and processes through collaboration and transparency with our stakeholders and the broader security ecosystem.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This incident serves as a&amp;nbsp;reminder of the importance of continuous monitoring and proactive and layered security measures, particularly for edge devices (such as VPNs) which provide an essential service as the initial access point to a corporate network – but which are also highly appealing to attackers.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Our Support team is always available to help customers and partners should they have any questions. Cases can be logged via the &lt;a href="https://success.ivanti.com/" target="_blank"&gt;Success portal &lt;/a&gt;(login credentials required).&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Want to stay up to date on Ivanti Security Advisories? Paste &lt;a href="https://www.ivanti.com/blog/topics/security-advisory"&gt;https://www.ivanti.com/blog/topics/security-advisory/rss&lt;/a&gt; into your preferred RSS reader / functionality in your email program.&lt;/em&gt;&lt;/p&gt;
</description><pubDate>Wed, 08 Jan 2025 17:00:58 Z</pubDate></item></channel></rss>