Company Details
ivanti
2,962
149,626
5112
ivanti.com
0
IVA_2329612
In-progress

Ivanti Company CyberSecurity Posture
ivanti.comIvanti is a global enterprise IT and security software company dedicated to unlocking human potential by managing, automating and protecting data and systems to empower continuous innovation. With adaptable software solutions tailored to customer needs, Ivanti empowers IT and security teams to enhance operational efficiency, cut costs and proactively mitigate security risks. At the heart of Ivanti’s offerings is the AI-powered Ivanti Neurons platform, which transforms the way IT and security teams operate. By delivering unified, reusable services and tools, the platform ensures consistent visibility, scalability, and secure solution implementation, enabling teams to work smarter, not harder. Over 34,000 customers, including 85 of the Fortune 100, have chosen Ivanti to meet their challenges. Ivanti follows “Secure by Design” principles to provide software solutions that scale with our customers’ needs to help enable IT and Security to improve operational efficiency while reducing costs and proactively reducing risk. Ivanti fosters an inclusive environment where diverse perspectives are honored and valued, reflecting a commitment to a sustainable future for customers, partners, employees and the planet.
Company Details
ivanti
2,962
149,626
5112
ivanti.com
0
IVA_2329612
In-progress
Between 550 and 599

Ivanti Global Score (TPRM)XXXX

Description: Cybersecurity threat intelligence company, GreyNoise, has reported an 800 percent increase in IP scanning on Ivanti VPN's Connect Secure and Pulse Secure systems over the past week, possibly indicating preparation for potential exploitation and public disclosure of vulnerabilities. Nearly a quarter of all scanning activity for Pulse Secure and Connect Secure endpoints recorded over the past 90 days happened in a single day, with a large proportion of IPs designated as 'suspicious' or 'malicious'. Ivanti's Connect Secure has been repeatedly targeted due to its role in enterprise remote access. The company advise customers to upgrade from end-of-life products to ensure system protection against known vulnerabilities.
Description: Ivanti, a cybersecurity firm, predicts Ransomware as a top threat for 2025, with AI enhancements escalating its danger. Despite 38% of security professionals foreseeing an increased threat level, only 29% feel very prepared, indicating a significant preparedness gap. Organizations struggle with exposure management adoption, with data blind spots and tool disparities between IT and security teams. API and software vulnerabilities remain critical threats without proper visibility. Moreover, considerable tech debt interferes with security practices, growth, and innovation, ultimately affecting the strategic role of CISOs in guiding AI adoption and supply chain risk management, despite increased board-level cybersecurity discussions.
Description: Ivanti has released security updates for its Neurons for ITSM IT service management solution to mitigate a critical authentication bypass vulnerability. Tracked as CVE-2025-22462, this flaw allows unauthenticated attackers to gain administrative access to unpatched systems in low-complexity attacks. Ivanti also patched a default credentials security flaw in its Cloud Services Appliance (CSA) and a critical Connect Secure zero-day exploited by the UNC5221 China-linked espionage group. Multiple other Ivanti security flaws have been exploited in zero-day attacks over the last year.
Description: Ivanti disclosed a high-severity vulnerability (CVE-2025-22460) in its **Cloud Services Application (CSA) versions 5.0.4 and earlier**, stemming from default credentials that could allow **local authenticated attackers to escalate privileges**, leading to **full system compromise**. The flaw, rated **CVSS 7.8 (High)**, impacts **confidentiality, integrity, and availability** but lacks evidence of active exploitation. While Ivanti released **version 5.0.5** as a patch, a **critical implementation flaw** prevents automatic remediation, requiring **manual reinstallation or mitigation steps**.The vulnerability poses a **serious risk** as privilege escalation often enables broader attack chains, potentially granting adversaries **unauthorized control over enterprise systems**. Ivanti’s advisory urges immediate action, including **log reviews for suspicious activity**, given its history of critical flaws in **Connect Secure, Policy Secure, and ZTA Gateway** products earlier this year. The CSA appliance, integral to Ivanti’s **Endpoint Manager**, secures internet-based communications, making its compromise a **gateway for deeper network infiltration** if left unpatched.
Description: Chinese espionage threat actors exploited a vulnerability in Ivanti's security products, leading to the deployment of powerful malware known as Resurge. This malware campaign, detailed by the Cybersecurity and Infrastructure Security Agency (CISA) and cybersecurity firm Mandiant, has resulted in compromised system integrity and data breaches. The malware's capability to modify files, harvest credentials, create accounts, reset passwords, and escalate permissions poses a significant security threat. Ivanti has advised customers to reset devices and credentials, evidencing the severity of this security breach.
Description: The vulnerabilities CVE-2025-4427 and CVE-2025-4428 in Ivanti Endpoint Manager Mobile (EPMM) were exploited by a Chinese cyber espionage group. The attackers achieved remote code execution on internet-exposed Ivanti EPMM deployments, set up a reverse shell, deployed malware, and extracted data including IMEI, phone numbers, location, LDAP users, and Office 365 tokens. The attack affected various entities globally, including government authorities, healthcare organizations, research institutes, legal firms, telcos, manufacturers, aerospace companies, healthcare providers, and more.
Description: Ivanti experienced a severe security breach due to an unauthenticated remote code execution vulnerability, CVE-2025-22457, exploited by a China-nexus threat actor. This vulnerability, impacting Ivanti Connect Secure, Pulse Connect Secure, Ivanti Policy Secure, and ZTA Gateways, allowed attackers to execute arbitrary code remotely via a complex heap spray technique. The exploitation resulted from a failure to check buffer lengths within the application's web server binary. With patches released for some products and others pending, the incident underscores the critical importance of applying security updates promptly to avoid potential data breaches and system compromisation.
Description: Ivanti suffered a security breach due to the exploitation of the vulnerability CVE-2025-0282, which affected Ivanti Connect Secure appliances. An advanced malware known as RESURGE targeted this flaw, providing unauthorized remote code execution and privilege escalation. There were a limited number of customers directly impacted by the breach. The exploitation of this vulnerability enabled the installation of persistent web shells, credential harvesting, account creation, and elevation of attacker privileges, posing a significant threat to the confidentiality, integrity, and availability of the organization's systems and data.
Description: In the first half of 2025, Ivanti became a primary target of **UNC5221**, a suspected China-linked state-sponsored threat group exploiting multiple vulnerabilities in its products, including **Endpoint Manager Mobile, Connect Secure, and Policy Secure**. These attacks were part of a broader trend where **69% of exploited vulnerabilities required no authentication**, enabling remote execution without credentials. The exploitation of Ivanti’s edge infrastructure—critical for encrypted traffic and privileged access—posed severe risks, including **unauthorized system control, espionage, and potential lateral movement into high-value networks**. The attacks align with geopolitical motives, particularly **state-sponsored espionage and surveillance**, targeting enterprise solutions to compromise sensitive data or maintain persistent access. While the article does not specify direct data breaches or operational disruptions, the **strategic weaponization of Ivanti’s flaws** by advanced threat actors suggests high-stakes consequences, including **potential compromise of government, defense, or critical infrastructure entities** relying on these systems. The lack of authentication requirements further amplifies the threat, as attackers could **remotely execute code (RCE) with full system control**, posing existential risks to organizations dependent on Ivanti’s security appliances.


Ivanti has 1945.45% more incidents than the average of same-industry companies with at least one recorded incident.
Ivanti has 1306.25% more incidents than the average of all companies with at least one recorded incident.
Ivanti reported 9 incidents this year: 0 cyber attacks, 1 ransomware, 7 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.
Ivanti cyber incidents detection timeline including parent company and subsidiaries

Ivanti is a global enterprise IT and security software company dedicated to unlocking human potential by managing, automating and protecting data and systems to empower continuous innovation. With adaptable software solutions tailored to customer needs, Ivanti empowers IT and security teams to enhance operational efficiency, cut costs and proactively mitigate security risks. At the heart of Ivanti’s offerings is the AI-powered Ivanti Neurons platform, which transforms the way IT and security teams operate. By delivering unified, reusable services and tools, the platform ensures consistent visibility, scalability, and secure solution implementation, enabling teams to work smarter, not harder. Over 34,000 customers, including 85 of the Fortune 100, have chosen Ivanti to meet their challenges. Ivanti follows “Secure by Design” principles to provide software solutions that scale with our customers’ needs to help enable IT and Security to improve operational efficiency while reducing costs and proactively reducing risk. Ivanti fosters an inclusive environment where diverse perspectives are honored and valued, reflecting a commitment to a sustainable future for customers, partners, employees and the planet.


The Bosch Group’s strategic objective is to create solutions for a connected life. Bosch improves quality of life worldwide with innovative products and services that are "Invented for life" and spark enthusiasm. Podcast: http://bit.ly/beyondbosch Imprint: https://www.bosch.us/corporate-informatio
At Bolt, we're building a future where people don’t need to own personal cars to move around safely and conveniently. A future where people have the freedom to use transport on demand, choosing whatever vehicle's best for each occasion — be it a car, scooter, or e-bike. We're helping over 200 mill
Pitney Bowes is a technology-driven products and services company that provides SaaS shipping solutions, mailing innovation, and financial services to clients around the world – including more than 90 percent of the Fortune 500. Small businesses to large enterprises, and government entities rely on

More than one billion people around the world use Instagram, and we’re proud to be bringing them closer to the people and things they love. Instagram inspires people to see the world differently, discover new interests, and express themselves. Since launching in 2010, our community has grown at a r

About Lazada Group Founded in 2012, Lazada Group is the leading eCommerce platform in Southeast Asia. We are accelerating progress in Indonesia, Malaysia, the Philippines, Singapore, Thailand and Vietnam through commerce and technology. With the largest logistics and payments networks in the regio

DiDi Global Inc. is a leading mobility technology platform. It offers a wide range of app-based services across Asia Pacific, Latin America, and other global markets, including ride hailing, taxi hailing, designated driving, hitch and other forms of shared mobility as well as certain energy and vehi
Autodesk is changing how the world is designed and made. Our technology spans architecture, engineering, construction, product design, manufacturing, and media and entertainment. We empower innovators everywhere to solve challenges, big and small. From greener buildings to smarter products and mo
Atlassian powers the collaboration that helps teams accomplish what would otherwise be impossible alone. From space missions and motor racing to bugs in code and IT requests, no task is too large or too small with the right team, the right tools, and the right practices. Over 300,000 global compa

Olá, somos a TOTVS! A maior empresa de tecnologia do Brasil. 🤓 Líder absoluta em sistemas e plataformas para empresas, a TOTVS possui mais de 70 mil clientes. Indo muito além do ERP, oferece tecnologia completa para digitalização dos negócios por meio de 3 unidades de negócio: - Gestão: ERPs, sol
.png)
Ivanti has released critical security updates for Ivanti Endpoint Manager to address three high-severity vulnerabilities.
Ivanti has rolled out security updates for its Endpoint Manager product, addressing three high-severity vulnerabilities that could let...
Cybersecurity researchers at Zscaler have uncovered a sophisticated malware campaign that exploits search engine optimization (SEO)...
Ivanti's Brooke Johnson: Leading with law, people, and purpose in cybersecurity · Integrating legal, security, and human leadership · Building...
Ivanti is urging all customers to transition from the now end-of-life EPM 2022 to EPM 2024 and apply interim mitigations until full patches...
Ivanti has disclosed 13 vulnerabilities in its Endpoint Manager (EPM) software, including two high-severity flaws that could enable remote...
Spooky season is in full swing, and this extends to Microsoft's October Patch Tuesday with security updates for a frightful 175 Microsoft...
Ivanti has disclosed 13 vulnerabilities in EPM, including two high-severity issues that could enable privilege escalation and remote code...
The editors have curated a list of noteworthy news about endpoint security and network monitoring from the week of October 3rd.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Ivanti is http://www.ivanti.com.
According to Rankiteo, Ivanti’s AI-generated cybersecurity score is 599, reflecting their Very Poor security posture.
According to Rankiteo, Ivanti currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Ivanti is not certified under SOC 2 Type 1.
According to Rankiteo, Ivanti does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Ivanti is not listed as GDPR compliant.
According to Rankiteo, Ivanti does not currently maintain PCI DSS compliance.
According to Rankiteo, Ivanti is not compliant with HIPAA regulations.
According to Rankiteo,Ivanti is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Ivanti operates primarily in the Software Development industry.
Ivanti employs approximately 2,962 people worldwide.
Ivanti presently has no subsidiaries across any sectors.
Ivanti’s official LinkedIn profile has approximately 149,626 followers.
Ivanti is classified under the NAICS code 5112, which corresponds to Software Publishers.
Yes, Ivanti has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/ivanti.
Yes, Ivanti maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/ivanti.
As of November 29, 2025, Rankiteo reports that Ivanti has experienced 9 cybersecurity incidents.
Ivanti has an estimated 26,757 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.