Security for everyone

CVE-2023-35082 Scanner

Detects 'Authentication Bypass' vulnerability in Ivanti EPMM affects v. 11.10 and before.


Short Info



Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one




Ivanti Endpoint Manager (EPM) is a platform widely used for the purpose of endpoint management, which is the process of securing and managing devices connected to a network. These devices can include computers, mobile devices, and other endpoints. Ivanti EPM is an all-in-one solution designed to simplify the management of endpoints and automate IT tasks. The platform enables efficient software distribution, remote control of endpoints, patch management, and asset management across multiple platforms.

CVE-2023-35082 is an authentication bypass vulnerability discovered in Ivanti EPM 11.10 and older versions. This vulnerability allows unauthorized users to gain access to restricted functionalities and resources of the application without proper authentication. Attackers can exploit this vulnerability to perform malicious activities such as executing unauthorized administrative actions, compromising sensitive data, and deploying malware across the network.

When exploited, this vulnerability can ultimately lead to the complete compromise of an organization's network. Attackers with unauthorized access can steal valuable data leading to financial loss, legal liabilities, and reputational damage. Additionally, an attacker with access to the Ivanti EPM platform can also execute unauthorized administrative actions and carry out destructive activities such as deleting important files and data.

Thanks to the pro features of, individuals can quickly and easily learn about vulnerabilities in their digital assets and take steps to secure them. The platform provides comprehensive cybersecurity solutions to prevent and detect potential security risks, protecting both individuals and organizations from attacks and data breaches. By staying informed on security risks and taking proactive measures to mitigate them, users can ensure that their digital assets remain safe and secure.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture