Zero Day Initiative reports 13 vulnerabilities in Ivanti Endpoint Manager
Take action: If you're running Ivanti Endpoint Manager, be aware that there are 13 unpatched vulnerabilities and no fixes available from the vendor. Isolate the IEM as much as possible from the internet and restrict access. Then start calling Ivanti for a patch. Hackers love Ivanti, and will try to exploit these flaws.
Learn More
The Zero Day Initiative (ZDI) has reported 13 unpatched vulnerabilities affecting Ivanti Endpoint Manager. The flaws, which Ivanti has failed to patch despite months of advance notification, include twelve remote code execution (RCE) vulnerabilities and one local privilege escalation flaw.
The vulnerabilities were discovered and privately reported to Ivanti by ZDI researchers between June and November 2024. Despite initial acknowledgments from the company, Ivanti repeatedly requested patching extensions, with some timelines pushed as far as March 2026. ZDI deems these delays unacceptable given the severity of the flaws and the company's troubling history of exploitation by nation-state threat actors. After notifying Ivanti of its intent to publicly release the advisories, ZDI proceeded with full disclosure on October 7, 2025, marking all 13 issues as zero-day vulnerabilities due to the absence of available patches.
Vulnerabilities summary:
- ZDI-CAN-26834 (CVSS score 8.8) - Ivanti Endpoint Manager Directory Traversal Remote Code Execution Vulnerability in OnSaveToDB method
- ZDI-CAN-25369 (CVSS score 7.8) - Ivanti Endpoint Manager AgentPortal Deserialization of Untrusted Data Local Privilege Escalation Vulnerability
- ZDI-CAN-26855 (CVSS score 7.2) - Ivanti Endpoint Manager Report_Run2 SQL Injection Remote Code Execution Vulnerability
- ZDI-CAN-26856 (CVSS score 7.2) - Ivanti Endpoint Manager Report_Run SQL Injection Remote Code Execution Vulnerability
- ZDI-CAN-26858 (CVSS score 7.2) - Ivanti Endpoint Manager Report_RunPatch SQL Injection Remote Code Execution Vulnerability
- ZDI-CAN-26860 (CVSS score 7.2) - Ivanti Endpoint Manager MP_VistaReport SQL Injection Remote Code Execution Vulnerability
- ZDI-CAN-26861 (CVSS score 7.2) - Ivanti Endpoint Manager MP_QueryDetail SQL Injection Remote Code Execution Vulnerability
- ZDI-CAN-26862 (CVSS score 7.2) - Ivanti Endpoint Manager GetCountForQuery SQL Injection Remote Code Execution Vulnerability
- ZDI-CAN-26864 (CVSS score 7.2) - Ivanti Endpoint Manager MP_QueryDetail2 SQL Injection Remote Code Execution Vulnerability
- ZDI-CAN-26865 (CVSS score 7.2) - Ivanti Endpoint Manager PatchHistory SQL Injection Remote Code Execution Vulnerability
- ZDI-CAN-26866 (CVSS score 7.2) - Ivanti Endpoint Manager DBDR SQL Injection Remote Code Execution Vulnerability
- ZDI-CAN-26857 (CVSS score 7.2) - Ivanti Endpoint Manager MP_Report_Run2 SQL Injection Remote Code Execution Vulnerability
- ZDI-CAN-26859 (CVSS score 7.2) - Ivanti Endpoint Manager Report_RunPatch SQL Injection Remote Code Execution Vulnerability
At the time of publication, Ivanti has not released patches for any of the disclosed vulnerabilities. Organizations using Ivanti Endpoint Manager are advised to reduce their attack surface and monitor for indicators of compromise, primarily isolating and restricting access to Ivanti Endpoint Manager interfaces from the internet and implementing VPN access with IP whitelisting wherever possible.