Ivanti Systems in the Post-CVE Era: To Patch or Not to Patch?


Given the recent CVE announcement that does not necessitate a factory reset but merely the application of patched firmware, and considering the granular capabilities of Ivanti systems, what would be your expert recommendation for a course of action? Particularly when taking into account the customer’s discretion on whether to incur the costs associated with migrating away from Ivanti, and if so, what alternatives should be considered? Additionally, how do you proceed when no product can guarantee complete issue-free operation yet the feature set is a necessity?


In the wake of a recent Common Vulnerabilities and Exposures (CVE) announcement, Ivanti system users find themselves at a crossroads. The CVE in question does not require a factory reset—only the installation of patched firmware. This is a relief for many, as it avoids the extensive downtime and labor associated with a full reset. However, it also raises questions about the future of cybersecurity and the viability of Ivanti systems.

The first step is a thorough risk assessment. Ivanti’s granular capabilities are a significant asset, offering a level of customization and control that is hard to match. Before making any decisions, it’s crucial to evaluate these features against the potential risks posed by the CVE. If the patched firmware addresses the vulnerabilities effectively, it may be prudent to apply the update and continue monitoring the system’s security posture closely.

Considering Migration:

Migration away from Ivanti is a considerable undertaking, both financially and operationally. Customers must weigh the costs against the benefits of moving to a new system. If the decision to migrate is made, it’s essential to identify alternatives that offer similar or superior granular controls. This process involves researching the market, testing potential replacements, and ensuring they align with the organization’s specific needs.

Dealing with Uncertainty:

No product in the cybersecurity landscape can promise an issue-free experience. The key is not to seek out a flawless system but to choose one that offers robust support, frequent updates, and a strong community or vendor backing. These factors contribute to a system’s resilience and the ability to respond swiftly to new threats.

Expert Recommendation:

If the Ivanti system’s feature set is indispensable and the patched firmware is deemed secure, my recommendation is to apply the update and enhance the system’s defenses with additional cybersecurity measures. This could include more frequent security audits, employee training, and the integration of advanced threat detection tools.

In parallel, begin planning for the future. Establish a contingency fund for potential migrations, keep abreast of developments in cybersecurity, and maintain a shortlist of alternative solutions. This proactive approach ensures that, should the need arise, the transition to a new system will be as smooth as possible.

In conclusion, while the CVE announcement is concerning, it also serves as a reminder of the dynamic nature of cybersecurity. By staying informed, assessing risks accurately, and preparing for various outcomes, organizations can navigate these challenges and maintain a secure and efficient operational environment.

Leave a Reply

Your email address will not be published. Required fields are marked *

Privacy Terms Contacts About Us