{"id":4430,"date":"2025-01-20T10:45:29","date_gmt":"2025-01-20T08:45:29","guid":{"rendered":"https:\/\/www.govcert.bg\/?p=4430"},"modified":"2025-01-20T10:45:29","modified_gmt":"2025-01-20T08:45:29","slug":"ivanti-%d0%bf%d1%83%d0%b1%d0%bb%d0%b8%d0%ba%d1%83%d0%b2%d0%b0-%d0%b0%d0%ba%d1%82%d1%83%d0%b0%d0%bb%d0%b8%d0%b7%d0%b0%d1%86%d0%b8%d0%b8-%d0%b7%d0%b0-%d1%81%d0%b8%d0%b3%d1%83%d1%80%d0%bd%d0%be%d1%81-4","status":"publish","type":"post","link":"https:\/\/www.govcert.bg\/en\/warnings\/ivanti-%d0%bf%d1%83%d0%b1%d0%bb%d0%b8%d0%ba%d1%83%d0%b2%d0%b0-%d0%b0%d0%ba%d1%82%d1%83%d0%b0%d0%bb%d0%b8%d0%b7%d0%b0%d1%86%d0%b8%d0%b8-%d0%b7%d0%b0-%d1%81%d0%b8%d0%b3%d1%83%d1%80%d0%bd%d0%be%d1%81-4\/","title":{"rendered":"Ivanti Releases Security Updates for Multiple Products"},"content":{"rendered":"<p style=\"text-align: justify;\"><a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2025\/01\/14\/microsoft-releases-january-2025-security-updates\">Ivanti<\/a> released security updates to address vulnerabilities in Ivanti Avalanche, Ivanti Application Control Engine, and Ivanti EPM.<\/p>\n<p style=\"text-align: justify;\"><strong>CERT Bulgaria<\/strong> encourages users and administrators to review the following Ivanti security advisories and apply the necessary guidance and updates:<\/p>\n<ul>\n<li><a href=\"https:\/\/forums.ivanti.com\/s\/article\/Security-Advisory-Ivanti-Avalanche-6-4-7-Multiple-CVEs?language=en_US&amp;_gl=1*1vtp72j*_gcl_au*NTM1ODE1MTIzLjE3MzU5Mjg1OTU.\">Ivanti Avalanche<\/a><\/li>\n<li><a href=\"https:\/\/forums.ivanti.com\/s\/article\/Security-Advisory-Ivanti-Application-Control-Engine-CVE-2024-10630?language=en_US&amp;_gl=1*1qr4hev*_gcl_au*NTM1ODE1MTIzLjE3MzU5Mjg1OTU.\">Ivanti Application Control Engine<\/a><\/li>\n<li><a href=\"https:\/\/forums.ivanti.com\/s\/article\/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6?language=en_US&amp;_gl=1*1qr4hev*_gcl_au*NTM1ODE1MTIzLjE3MzU5Mjg1OTU.\">Ivanti EPM<\/a><\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Ivanti released security updates to address vulnerabilities in Ivanti Avalanche, Ivanti Application Control Engine, and Ivanti EPM.<\/p>","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[44],"tags":[],"class_list":["post-4430","post","type-post","status-publish","format-standard","hentry","category-warnings"],"_links":{"self":[{"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/posts\/4430","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/comments?post=4430"}],"version-history":[{"count":1,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/posts\/4430\/revisions"}],"predecessor-version":[{"id":4431,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/posts\/4430\/revisions\/4431"}],"wp:attachment":[{"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/media?parent=4430"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/categories?post=4430"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/tags?post=4430"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}