Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
endpoint_manager Vendor: ivanti

About This Product

endpoint_manager is a software product offered by ivanti. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 113 known vulnerabilities affecting ivanti endpoint_manager. This includes 13 critical-severity issues and 76 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2017 to 2026, indicating a sustained research interest and ongoing security attention. 24 medium-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2017-11463 2017-12-11 2025-04-20 8.8 6.5 Likely
CVE-2019-10651 2019-07-11 2024-11-21 9.8 7.5 Likely
CVE-2020-13770 2020-11-12 2024-11-21 7.8 7.2 Unknown
CVE-2020-13771 2020-11-12 2024-11-21 7.8 6.9 Unknown
CVE-2020-13774 2020-11-12 2024-11-21 9.9 9.0 Likely
CVE-2020-13769 2020-11-16 2024-11-21 8.8 6.5 Likely
CVE-2020-13772 2020-11-16 2024-11-21 5.3 5.0 Likely
CVE-2020-13773 2020-11-16 2024-11-21 5.4 3.5 Unknown
CVE-2022-30121 2022-09-23 2025-05-22 6.7 - -
CVE-2022-27773 2022-12-05 2025-04-24 9.8 - -
CVE-2022-35259 2022-12-05 2025-04-24 7.8 - -
CVE-2023-28323 2023-07-01 2025-05-05 9.8 - -
CVE-2023-28324 2023-07-01 2024-11-21 9.8 - -
CVE-2023-35077 2023-07-21 2024-11-21 7.5 - -
CVE-2023-38343 2023-09-21 2024-11-21 7.5 - -
CVE-2023-38344 2023-09-21 2024-11-21 6.5 - -
CVE-2023-35083 2023-10-18 2024-11-21 6.5 - -
CVE-2023-35084 2023-10-18 2024-11-21 9.8 - -
CVE-2023-39336 2024-01-09 2025-06-03 8.8 - -
CVE-2024-22058 2024-05-31 2025-06-20 7.8 - -
CVE-2024-29822 2024-05-31 2024-11-21 8.8 - -
CVE-2024-29823 2024-05-31 2024-11-21 8.8 - -
CVE-2024-29824 2024-05-31 2025-10-30 8.8 - -
CVE-2024-29825 2024-05-31 2024-11-21 8.8 - -
CVE-2024-29826 2024-05-31 2024-11-21 8.8 - -
CVE-2024-29827 2024-05-31 2024-11-21 8.8 - -
CVE-2024-29828 2024-05-31 2024-11-21 8.0 - -
CVE-2024-29829 2024-05-31 2024-11-21 8.0 - -
CVE-2024-29830 2024-05-31 2024-11-21 8.0 - -
CVE-2024-29846 2024-05-31 2024-11-21 8.0 - -
CVE-2024-37381 2024-07-29 2025-07-10 8.0 - -
CVE-2024-8191 2024-09-10 2024-09-12 7.8 - -
CVE-2024-8320 2024-09-10 2024-09-12 5.3 - -
CVE-2024-8321 2024-09-10 2024-09-12 5.8 - -
CVE-2024-8322 2024-09-10 2024-09-12 4.3 - -
CVE-2024-8441 2024-09-10 2024-09-12 6.7 - -
CVE-2024-29847 2024-09-12 2024-09-12 9.8 - -
CVE-2024-32840 2024-09-12 2024-09-12 7.2 - -
CVE-2024-32842 2024-09-12 2024-09-12 7.2 - -
CVE-2024-32843 2024-09-12 2024-09-12 7.2 - -
CVE-2024-32845 2024-09-12 2024-09-12 7.2 - -
CVE-2024-32846 2024-09-12 2024-09-12 7.2 - -
CVE-2024-32848 2024-09-12 2024-09-12 7.2 - -
CVE-2024-34779 2024-09-12 2024-09-12 7.2 - -
CVE-2024-34783 2024-09-12 2024-09-12 7.2 - -
CVE-2024-34785 2024-09-12 2024-09-12 7.2 - -
CVE-2024-37397 2024-09-12 2025-07-10 8.2 - -
CVE-2024-50322 2024-11-12 2024-11-18 7.8 - -
CVE-2024-50323 2024-11-12 2024-11-18 7.8 - -
CVE-2024-50324 2024-11-12 2024-11-18 7.2 - -
CVE-2024-50326 2024-11-12 2024-11-18 7.2 - -
CVE-2024-50327 2024-11-12 2024-11-18 7.2 - -
CVE-2024-50328 2024-11-12 2024-11-18 7.2 - -
CVE-2024-50329 2024-11-12 2024-11-18 8.8 - -
CVE-2024-50330 2024-11-12 2025-04-23 9.8 - -
CVE-2024-32839 2024-11-13 2025-04-23 7.2 - -
CVE-2024-32841 2024-11-13 2025-04-23 7.2 - -
CVE-2024-32844 2024-11-13 2025-04-23 7.2 - -
CVE-2024-32847 2024-11-13 2025-04-24 7.2 - -
CVE-2024-34780 2024-11-13 2025-04-23 7.2 - -
CVE-2024-34781 2024-11-13 2025-05-01 7.2 - -
CVE-2024-34782 2024-11-13 2025-05-01 7.2 - -
CVE-2024-34784 2024-11-13 2025-05-01 7.2 - -
CVE-2024-34787 2024-11-13 2025-05-01 7.8 - -
CVE-2024-37376 2024-11-13 2025-05-01 7.2 - -
CVE-2024-10256 2024-12-10 2025-08-12 7.1 - -
CVE-2024-10811 2025-01-14 2025-06-17 9.8 - -
CVE-2024-13158 2025-01-14 2025-08-12 7.2 - -
CVE-2024-13159 2025-01-14 2025-10-24 9.8 - -
CVE-2024-13160 2025-01-14 2025-10-24 9.8 - -
CVE-2024-13161 2025-01-14 2025-10-24 9.8 - -
CVE-2024-13162 2025-01-14 2025-07-11 7.2 - -
CVE-2024-13163 2025-01-14 2025-07-11 7.8 - -
CVE-2024-13164 2025-01-14 2025-07-11 7.8 - -
CVE-2024-13165 2025-01-14 2025-07-11 7.5 - -
CVE-2024-13166 2025-01-14 2025-07-11 7.5 - -
CVE-2024-13167 2025-01-14 2025-07-11 7.5 - -
CVE-2024-13168 2025-01-14 2025-07-11 7.5 - -
CVE-2024-13169 2025-01-14 2025-07-11 7.8 - -
CVE-2024-13170 2025-01-14 2025-07-11 7.5 - -
CVE-2024-13171 2025-01-14 2025-07-11 7.8 - -
CVE-2024-13172 2025-01-14 2025-07-11 7.8 - -
CVE-2025-22458 2025-04-08 2025-05-17 7.8 - -
CVE-2025-22459 2025-04-08 2025-05-16 4.8 - -
CVE-2025-22461 2025-04-08 2025-05-16 7.2 - -
CVE-2025-22464 2025-04-08 2025-05-16 6.1 - -
CVE-2025-22465 2025-04-08 2025-05-16 6.1 - -
CVE-2025-22466 2025-04-08 2025-05-16 8.2 - -
CVE-2025-6995 2025-07-08 2025-07-11 8.4 - -
CVE-2025-6996 2025-07-08 2025-07-11 8.4 - -
CVE-2025-7037 2025-07-08 2025-07-11 7.2 - -
CVE-2025-9712 2025-09-09 2025-10-10 8.8 - -
CVE-2025-9872 2025-09-09 2025-10-10 8.8 - -
CVE-2025-11622 2025-10-13 2025-11-11 7.8 - -
CVE-2025-9713 2025-10-13 2025-11-11 8.8 - -
CVE-2025-11623 2025-10-13 2026-02-10 6.5 - -
CVE-2025-62383 2025-10-13 2026-02-10 6.5 - -
CVE-2025-62384 2025-10-13 2026-02-10 6.5 - -
CVE-2025-62385 2025-10-13 2026-02-10 6.5 - -
CVE-2025-62386 2025-10-13 2026-02-10 6.5 - -
CVE-2025-62387 2025-10-13 2026-02-10 6.5 - -
CVE-2025-62388 2025-10-13 2026-02-10 6.5 - -
CVE-2025-62389 2025-10-13 2026-02-10 6.5 - -
CVE-2025-62390 2025-10-13 2026-02-10 6.5 - -
CVE-2025-62391 2025-10-13 2026-02-10 6.5 - -
CVE-2025-62392 2025-10-13 2026-02-10 6.5 - -
CVE-2025-10918 2025-11-11 2025-11-17 7.1 - -
CVE-2025-10573 2025-12-09 2025-12-11 9.6 - -
CVE-2025-13659 2025-12-09 2025-12-11 8.8 - -
CVE-2025-13661 2025-12-09 2025-12-11 7.1 - -
CVE-2025-13662 2025-12-09 2025-12-11 7.8 - -
CVE-2026-1602 2026-02-10 2026-02-12 6.5 - -
CVE-2026-1603 2026-02-10 2026-03-10 8.6 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for ivanti endpoint_manager by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.