ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Ivanti is a global enterprise IT and security software company dedicated to unlocking human potential by managing, automating and protecting data and systems to empower continuous innovation. With adaptable software solutions tailored to customer needs, Ivanti empowers IT and security teams to enhance operational efficiency, cut costs and proactively mitigate security risks. At the heart of Ivanti’s offerings is the AI-powered Ivanti Neurons platform, which transforms the way IT and security teams operate. By delivering unified, reusable services and tools, the platform ensures consistent visibility, scalability, and secure solution implementation, enabling teams to work smarter, not harder. Over 34,000 customers, including 85 of the Fortune 100, have chosen Ivanti to meet their challenges. Ivanti follows “Secure by Design” principles to provide software solutions that scale with our customers’ needs to help enable IT and Security to improve operational efficiency while reducing costs and proactively reducing risk. Ivanti fosters an inclusive environment where diverse perspectives are honored and valued, reflecting a commitment to a sustainable future for customers, partners, employees and the planet.

Ivanti A.I CyberSecurity Scoring

Ivanti

Company Details

Linkedin ID:

ivanti

Employees number:

2,962

Number of followers:

149,626

NAICS:

5112

Industry Type:

Software Development

Homepage:

ivanti.com

IP Addresses:

0

Company ID:

IVA_2329612

Scan Status:

In-progress

AI scoreIvanti Risk Score (AI oriented)

Between 550 and 599

https://images.rankiteo.com/companyimages/ivanti.jpeg
Ivanti Software Development
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreIvanti Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/ivanti.jpeg
Ivanti Software Development
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Ivanti Company CyberSecurity News & History

Past Incidents
9
Attack Types
3
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
IvantiBreach6034/2025
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: Cybersecurity threat intelligence company, GreyNoise, has reported an 800 percent increase in IP scanning on Ivanti VPN's Connect Secure and Pulse Secure systems over the past week, possibly indicating preparation for potential exploitation and public disclosure of vulnerabilities. Nearly a quarter of all scanning activity for Pulse Secure and Connect Secure endpoints recorded over the past 90 days happened in a single day, with a large proportion of IPs designated as 'suspicious' or 'malicious'. Ivanti's Connect Secure has been repeatedly targeted due to its role in enterprise remote access. The company advise customers to upgrade from end-of-life products to ensure system protection against known vulnerabilities.

IvantiRansomware10053/2025
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: Ivanti, a cybersecurity firm, predicts Ransomware as a top threat for 2025, with AI enhancements escalating its danger. Despite 38% of security professionals foreseeing an increased threat level, only 29% feel very prepared, indicating a significant preparedness gap. Organizations struggle with exposure management adoption, with data blind spots and tool disparities between IT and security teams. API and software vulnerabilities remain critical threats without proper visibility. Moreover, considerable tech debt interferes with security practices, growth, and innovation, ultimately affecting the strategic role of CISOs in guiding AI adoption and supply chain risk management, despite increased board-level cybersecurity discussions.

IvantiVulnerability2515/2025
Rankiteo Explanation :
Attack without any consequences

Description: Ivanti has released security updates for its Neurons for ITSM IT service management solution to mitigate a critical authentication bypass vulnerability. Tracked as CVE-2025-22462, this flaw allows unauthenticated attackers to gain administrative access to unpatched systems in low-complexity attacks. Ivanti also patched a default credentials security flaw in its Cloud Services Appliance (CSA) and a critical Connect Secure zero-day exploited by the UNC5221 China-linked espionage group. Multiple other Ivanti security flaws have been exploited in zero-day attacks over the last year.

IvantiVulnerability6035/2025
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: Ivanti disclosed a high-severity vulnerability (CVE-2025-22460) in its **Cloud Services Application (CSA) versions 5.0.4 and earlier**, stemming from default credentials that could allow **local authenticated attackers to escalate privileges**, leading to **full system compromise**. The flaw, rated **CVSS 7.8 (High)**, impacts **confidentiality, integrity, and availability** but lacks evidence of active exploitation. While Ivanti released **version 5.0.5** as a patch, a **critical implementation flaw** prevents automatic remediation, requiring **manual reinstallation or mitigation steps**.The vulnerability poses a **serious risk** as privilege escalation often enables broader attack chains, potentially granting adversaries **unauthorized control over enterprise systems**. Ivanti’s advisory urges immediate action, including **log reviews for suspicious activity**, given its history of critical flaws in **Connect Secure, Policy Secure, and ZTA Gateway** products earlier this year. The CSA appliance, integral to Ivanti’s **Endpoint Manager**, secures internet-based communications, making its compromise a **gateway for deeper network infiltration** if left unpatched.

IvantiVulnerability10054/2025
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: Chinese espionage threat actors exploited a vulnerability in Ivanti's security products, leading to the deployment of powerful malware known as Resurge. This malware campaign, detailed by the Cybersecurity and Infrastructure Security Agency (CISA) and cybersecurity firm Mandiant, has resulted in compromised system integrity and data breaches. The malware's capability to modify files, harvest credentials, create accounts, reset passwords, and escalate permissions poses a significant security threat. Ivanti has advised customers to reset devices and credentials, evidencing the severity of this security breach.

IvantiVulnerability1005/2025
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: The vulnerabilities CVE-2025-4427 and CVE-2025-4428 in Ivanti Endpoint Manager Mobile (EPMM) were exploited by a Chinese cyber espionage group. The attackers achieved remote code execution on internet-exposed Ivanti EPMM deployments, set up a reverse shell, deployed malware, and extracted data including IMEI, phone numbers, location, LDAP users, and Office 365 tokens. The attack affected various entities globally, including government authorities, healthcare organizations, research institutes, legal firms, telcos, manufacturers, aerospace companies, healthcare providers, and more.

IvantiVulnerability10054/2025
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: Ivanti experienced a severe security breach due to an unauthenticated remote code execution vulnerability, CVE-2025-22457, exploited by a China-nexus threat actor. This vulnerability, impacting Ivanti Connect Secure, Pulse Connect Secure, Ivanti Policy Secure, and ZTA Gateways, allowed attackers to execute arbitrary code remotely via a complex heap spray technique. The exploitation resulted from a failure to check buffer lengths within the application's web server binary. With patches released for some products and others pending, the incident underscores the critical importance of applying security updates promptly to avoid potential data breaches and system compromisation.

IvantiVulnerability10053/2025
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: Ivanti suffered a security breach due to the exploitation of the vulnerability CVE-2025-0282, which affected Ivanti Connect Secure appliances. An advanced malware known as RESURGE targeted this flaw, providing unauthorized remote code execution and privilege escalation. There were a limited number of customers directly impacted by the breach. The exploitation of this vulnerability enabled the installation of persistent web shells, credential harvesting, account creation, and elevation of attacker privileges, posing a significant threat to the confidentiality, integrity, and availability of the organization's systems and data.

IvantiVulnerability10056/2025
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: In the first half of 2025, Ivanti became a primary target of **UNC5221**, a suspected China-linked state-sponsored threat group exploiting multiple vulnerabilities in its products, including **Endpoint Manager Mobile, Connect Secure, and Policy Secure**. These attacks were part of a broader trend where **69% of exploited vulnerabilities required no authentication**, enabling remote execution without credentials. The exploitation of Ivanti’s edge infrastructure—critical for encrypted traffic and privileged access—posed severe risks, including **unauthorized system control, espionage, and potential lateral movement into high-value networks**. The attacks align with geopolitical motives, particularly **state-sponsored espionage and surveillance**, targeting enterprise solutions to compromise sensitive data or maintain persistent access. While the article does not specify direct data breaches or operational disruptions, the **strategic weaponization of Ivanti’s flaws** by advanced threat actors suggests high-stakes consequences, including **potential compromise of government, defense, or critical infrastructure entities** relying on these systems. The lack of authentication requirements further amplifies the threat, as attackers could **remotely execute code (RCE) with full system control**, posing existential risks to organizations dependent on Ivanti’s security appliances.

Ivanti
Breach
Severity: 60
Impact: 3
Seen: 4/2025
Blog:
Rankiteo Explanation
Attack with significant impact with internal employee data leaks

Description: Cybersecurity threat intelligence company, GreyNoise, has reported an 800 percent increase in IP scanning on Ivanti VPN's Connect Secure and Pulse Secure systems over the past week, possibly indicating preparation for potential exploitation and public disclosure of vulnerabilities. Nearly a quarter of all scanning activity for Pulse Secure and Connect Secure endpoints recorded over the past 90 days happened in a single day, with a large proportion of IPs designated as 'suspicious' or 'malicious'. Ivanti's Connect Secure has been repeatedly targeted due to its role in enterprise remote access. The company advise customers to upgrade from end-of-life products to ensure system protection against known vulnerabilities.

Ivanti
Ransomware
Severity: 100
Impact: 5
Seen: 3/2025
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: Ivanti, a cybersecurity firm, predicts Ransomware as a top threat for 2025, with AI enhancements escalating its danger. Despite 38% of security professionals foreseeing an increased threat level, only 29% feel very prepared, indicating a significant preparedness gap. Organizations struggle with exposure management adoption, with data blind spots and tool disparities between IT and security teams. API and software vulnerabilities remain critical threats without proper visibility. Moreover, considerable tech debt interferes with security practices, growth, and innovation, ultimately affecting the strategic role of CISOs in guiding AI adoption and supply chain risk management, despite increased board-level cybersecurity discussions.

Ivanti
Vulnerability
Severity: 25
Impact: 1
Seen: 5/2025
Blog:
Rankiteo Explanation
Attack without any consequences

Description: Ivanti has released security updates for its Neurons for ITSM IT service management solution to mitigate a critical authentication bypass vulnerability. Tracked as CVE-2025-22462, this flaw allows unauthenticated attackers to gain administrative access to unpatched systems in low-complexity attacks. Ivanti also patched a default credentials security flaw in its Cloud Services Appliance (CSA) and a critical Connect Secure zero-day exploited by the UNC5221 China-linked espionage group. Multiple other Ivanti security flaws have been exploited in zero-day attacks over the last year.

Ivanti
Vulnerability
Severity: 60
Impact: 3
Seen: 5/2025
Blog:
Rankiteo Explanation
Attack with significant impact with internal employee data leaks

Description: Ivanti disclosed a high-severity vulnerability (CVE-2025-22460) in its **Cloud Services Application (CSA) versions 5.0.4 and earlier**, stemming from default credentials that could allow **local authenticated attackers to escalate privileges**, leading to **full system compromise**. The flaw, rated **CVSS 7.8 (High)**, impacts **confidentiality, integrity, and availability** but lacks evidence of active exploitation. While Ivanti released **version 5.0.5** as a patch, a **critical implementation flaw** prevents automatic remediation, requiring **manual reinstallation or mitigation steps**.The vulnerability poses a **serious risk** as privilege escalation often enables broader attack chains, potentially granting adversaries **unauthorized control over enterprise systems**. Ivanti’s advisory urges immediate action, including **log reviews for suspicious activity**, given its history of critical flaws in **Connect Secure, Policy Secure, and ZTA Gateway** products earlier this year. The CSA appliance, integral to Ivanti’s **Endpoint Manager**, secures internet-based communications, making its compromise a **gateway for deeper network infiltration** if left unpatched.

Ivanti
Vulnerability
Severity: 100
Impact: 5
Seen: 4/2025
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: Chinese espionage threat actors exploited a vulnerability in Ivanti's security products, leading to the deployment of powerful malware known as Resurge. This malware campaign, detailed by the Cybersecurity and Infrastructure Security Agency (CISA) and cybersecurity firm Mandiant, has resulted in compromised system integrity and data breaches. The malware's capability to modify files, harvest credentials, create accounts, reset passwords, and escalate permissions poses a significant security threat. Ivanti has advised customers to reset devices and credentials, evidencing the severity of this security breach.

Ivanti
Vulnerability
Severity: 100
Impact:
Seen: 5/2025
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: The vulnerabilities CVE-2025-4427 and CVE-2025-4428 in Ivanti Endpoint Manager Mobile (EPMM) were exploited by a Chinese cyber espionage group. The attackers achieved remote code execution on internet-exposed Ivanti EPMM deployments, set up a reverse shell, deployed malware, and extracted data including IMEI, phone numbers, location, LDAP users, and Office 365 tokens. The attack affected various entities globally, including government authorities, healthcare organizations, research institutes, legal firms, telcos, manufacturers, aerospace companies, healthcare providers, and more.

Ivanti
Vulnerability
Severity: 100
Impact: 5
Seen: 4/2025
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: Ivanti experienced a severe security breach due to an unauthenticated remote code execution vulnerability, CVE-2025-22457, exploited by a China-nexus threat actor. This vulnerability, impacting Ivanti Connect Secure, Pulse Connect Secure, Ivanti Policy Secure, and ZTA Gateways, allowed attackers to execute arbitrary code remotely via a complex heap spray technique. The exploitation resulted from a failure to check buffer lengths within the application's web server binary. With patches released for some products and others pending, the incident underscores the critical importance of applying security updates promptly to avoid potential data breaches and system compromisation.

Ivanti
Vulnerability
Severity: 100
Impact: 5
Seen: 3/2025
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: Ivanti suffered a security breach due to the exploitation of the vulnerability CVE-2025-0282, which affected Ivanti Connect Secure appliances. An advanced malware known as RESURGE targeted this flaw, providing unauthorized remote code execution and privilege escalation. There were a limited number of customers directly impacted by the breach. The exploitation of this vulnerability enabled the installation of persistent web shells, credential harvesting, account creation, and elevation of attacker privileges, posing a significant threat to the confidentiality, integrity, and availability of the organization's systems and data.

Ivanti
Vulnerability
Severity: 100
Impact: 5
Seen: 6/2025
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: In the first half of 2025, Ivanti became a primary target of **UNC5221**, a suspected China-linked state-sponsored threat group exploiting multiple vulnerabilities in its products, including **Endpoint Manager Mobile, Connect Secure, and Policy Secure**. These attacks were part of a broader trend where **69% of exploited vulnerabilities required no authentication**, enabling remote execution without credentials. The exploitation of Ivanti’s edge infrastructure—critical for encrypted traffic and privileged access—posed severe risks, including **unauthorized system control, espionage, and potential lateral movement into high-value networks**. The attacks align with geopolitical motives, particularly **state-sponsored espionage and surveillance**, targeting enterprise solutions to compromise sensitive data or maintain persistent access. While the article does not specify direct data breaches or operational disruptions, the **strategic weaponization of Ivanti’s flaws** by advanced threat actors suggests high-stakes consequences, including **potential compromise of government, defense, or critical infrastructure entities** relying on these systems. The lack of authentication requirements further amplifies the threat, as attackers could **remotely execute code (RCE) with full system control**, posing existential risks to organizations dependent on Ivanti’s security appliances.

Ailogo

Ivanti Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Ivanti

Incidents vs Software Development Industry Average (This Year)

Ivanti has 1945.45% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

Ivanti has 1306.25% more incidents than the average of all companies with at least one recorded incident.

Incident Types Ivanti vs Software Development Industry Avg (This Year)

Ivanti reported 9 incidents this year: 0 cyber attacks, 1 ransomware, 7 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.

Incident History — Ivanti (X = Date, Y = Severity)

Ivanti cyber incidents detection timeline including parent company and subsidiaries

Ivanti Company Subsidiaries

SubsidiaryImage

Ivanti is a global enterprise IT and security software company dedicated to unlocking human potential by managing, automating and protecting data and systems to empower continuous innovation. With adaptable software solutions tailored to customer needs, Ivanti empowers IT and security teams to enhance operational efficiency, cut costs and proactively mitigate security risks. At the heart of Ivanti’s offerings is the AI-powered Ivanti Neurons platform, which transforms the way IT and security teams operate. By delivering unified, reusable services and tools, the platform ensures consistent visibility, scalability, and secure solution implementation, enabling teams to work smarter, not harder. Over 34,000 customers, including 85 of the Fortune 100, have chosen Ivanti to meet their challenges. Ivanti follows “Secure by Design” principles to provide software solutions that scale with our customers’ needs to help enable IT and Security to improve operational efficiency while reducing costs and proactively reducing risk. Ivanti fosters an inclusive environment where diverse perspectives are honored and valued, reflecting a commitment to a sustainable future for customers, partners, employees and the planet.

Loading...
similarCompanies

Ivanti Similar Companies

Bosch USA

The Bosch Group’s strategic objective is to create solutions for a connected life. Bosch improves quality of life worldwide with innovative products and services that are "Invented for life"​ and spark enthusiasm. Podcast: http://bit.ly/beyondbosch Imprint: https://www.bosch.us/corporate-informatio

Bolt

At Bolt, we're building a future where people don’t need to own personal cars to move around safely and conveniently. A future where people have the freedom to use transport on demand, choosing whatever vehicle's best for each occasion — be it a car, scooter, or e-bike. We're helping over 200 mill

Pitney Bowes

Pitney Bowes is a technology-driven products and services company that provides SaaS shipping solutions, mailing innovation, and financial services to clients around the world – including more than 90 percent of the Fortune 500. Small businesses to large enterprises, and government entities rely on

Instagram

More than one billion people around the world use Instagram, and we’re proud to be bringing them closer to the people and things they love. Instagram inspires people to see the world differently, discover new interests, and express themselves. Since launching in 2010, our community has grown at a r

Lazada

About Lazada Group Founded in 2012, Lazada Group is the leading eCommerce platform in Southeast Asia. We are accelerating progress in Indonesia, Malaysia, the Philippines, Singapore, Thailand and Vietnam through commerce and technology. With the largest logistics and payments networks in the regio

DiDi Global Inc. is a leading mobility technology platform. It offers a wide range of app-based services across Asia Pacific, Latin America, and other global markets, including ride hailing, taxi hailing, designated driving, hitch and other forms of shared mobility as well as certain energy and vehi

Autodesk

Autodesk is changing how the world is designed and made. Our technology spans architecture, engineering, construction, product design, manufacturing, and media and entertainment. We empower innovators everywhere to solve challenges, big and small. From greener buildings to smarter products and mo

Atlassian

Atlassian powers the collaboration that helps teams accomplish what would otherwise be impossible alone. From space missions and motor racing to bugs in code and IT requests, no task is too large or too small with the right team, the right tools, and the right practices. Over 300,000 global compa

TOTVS

Olá, somos a TOTVS! A maior empresa de tecnologia do Brasil. 🤓 Líder absoluta em sistemas e plataformas para empresas, a TOTVS possui mais de 70 mil clientes. Indo muito além do ERP, oferece tecnologia completa para digitalização dos negócios por meio de 3 unidades de negócio: - Gestão: ERPs, sol

newsone

Ivanti CyberSecurity News

November 11, 2025 03:44 PM
Ivanti Endpoint Manager Vulnerabilities Let Attackers Write Files Anywhere on Target Systems

Ivanti has released critical security updates for Ivanti Endpoint Manager to address three high-severity vulnerabilities.

November 11, 2025 03:29 PM
Ivanti Endpoint Manager Vulnerabilities Let Attackers Write Arbitrary Files to Disk

Ivanti has rolled out security updates for its Endpoint Manager product, addressing three high-severity vulnerabilities that could let...

October 16, 2025 07:00 AM
Malicious Ivanti VPN Client Sites in Google Search Deliver Malware — Users Warned

Cybersecurity researchers at Zscaler have uncovered a sophisticated malware campaign that exploits search engine optimization (SEO)...

October 15, 2025 07:00 AM
Ivanti’s Brooke Johnson: Leading with law, people, and purpose in cybersecurity

Ivanti's Brooke Johnson: Leading with law, people, and purpose in cybersecurity · Integrating legal, security, and human leadership · Building...

October 14, 2025 07:00 AM
Ivanti Patches 13 Critical Vulnerabilities in Endpoint Manager Enabling Remote Code Execution

Ivanti is urging all customers to transition from the now end-of-life EPM 2022 to EPM 2024 and apply interim mitigations until full patches...

October 14, 2025 07:00 AM
Ivanti Patches 13 Vulnerabilities in Endpoint Manager Allowing Remote Code Execution

Ivanti has disclosed 13 vulnerabilities in its Endpoint Manager (EPM) software, including two high-severity flaws that could enable remote...

October 14, 2025 07:00 AM
Frightful Patch Tuesday gives admins a scare with 175+ Microsoft CVEs, 3 under attack

Spooky season is in full swing, and this extends to Microsoft's October Patch Tuesday with security updates for a frightful 175 Microsoft...

October 14, 2025 07:00 AM
Ivanti Patches 13 Endpoint Manager Flaws Allowing Remote Code Execution

Ivanti has disclosed 13 vulnerabilities in EPM, including two high-severity issues that could enable privilege escalation and remote code...

October 03, 2025 07:00 AM
Endpoint Security and Network Monitoring News for the Week of October 3rd: Vectra AI, Swimlane, Ivanti, and More

The editors have curated a list of noteworthy news about endpoint security and network monitoring from the week of October 3rd.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Ivanti CyberSecurity History Information

Official Website of Ivanti

The official website of Ivanti is http://www.ivanti.com.

Ivanti’s AI-Generated Cybersecurity Score

According to Rankiteo, Ivanti’s AI-generated cybersecurity score is 599, reflecting their Very Poor security posture.

How many security badges does Ivanti’ have ?

According to Rankiteo, Ivanti currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Ivanti have SOC 2 Type 1 certification ?

According to Rankiteo, Ivanti is not certified under SOC 2 Type 1.

Does Ivanti have SOC 2 Type 2 certification ?

According to Rankiteo, Ivanti does not hold a SOC 2 Type 2 certification.

Does Ivanti comply with GDPR ?

According to Rankiteo, Ivanti is not listed as GDPR compliant.

Does Ivanti have PCI DSS certification ?

According to Rankiteo, Ivanti does not currently maintain PCI DSS compliance.

Does Ivanti comply with HIPAA ?

According to Rankiteo, Ivanti is not compliant with HIPAA regulations.

Does Ivanti have ISO 27001 certification ?

According to Rankiteo,Ivanti is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Ivanti

Ivanti operates primarily in the Software Development industry.

Number of Employees at Ivanti

Ivanti employs approximately 2,962 people worldwide.

Subsidiaries Owned by Ivanti

Ivanti presently has no subsidiaries across any sectors.

Ivanti’s LinkedIn Followers

Ivanti’s official LinkedIn profile has approximately 149,626 followers.

NAICS Classification of Ivanti

Ivanti is classified under the NAICS code 5112, which corresponds to Software Publishers.

Ivanti’s Presence on Crunchbase

Yes, Ivanti has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/ivanti.

Ivanti’s Presence on LinkedIn

Yes, Ivanti maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/ivanti.

Cybersecurity Incidents Involving Ivanti

As of November 29, 2025, Rankiteo reports that Ivanti has experienced 9 cybersecurity incidents.

Number of Peer and Competitor Companies

Ivanti has an estimated 26,757 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Ivanti ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.

Risk Information
cvss4
Base: 6.2
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.

Description

Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=ivanti' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge