Close Menu
geekfence.comgeekfence.com
    What's Hot

    Duck Creek is entering its operating model era

    April 29, 2026

    Sparse AI Hardware Slashes Energy and Latency

    April 29, 2026

    Rogers to offer voluntary buyouts to 10,000 employees

    April 29, 2026
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»Cyber Security»Recently patched Ivanti EPM flaw now actively exploited
    Cyber Security

    Recently patched Ivanti EPM flaw now actively exploited

    AdminBy AdminMarch 10, 2026No Comments3 Mins Read5 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Recently patched Ivanti EPM flaw now actively exploited
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Recently patched Ivanti EPM flaw now actively exploited

    CISA flagged a high-severity Ivanti Endpoint Manager (EPM) vulnerability as actively exploited in attacks and ordered U.S. federal agencies to patch systems within three weeks.

    Ivanti’s EPM software is an all-in-one endpoint management solution for managing client devices across Windows, macOS, Linux, Chrome OS, and IoT platforms.

    Tracked as CVE-2026-1603, this security flaw can be exploited by remote threat actors without privileges to bypass authentication and steal credential data in low-complexity cross-site scripting attacks that require no user interaction.

    Ivanti patched the vulnerability one month ago, when it released Ivanti EPM 2024 SU5, which also addresses an SQL injection flaw that allows remote, authenticated attackers to read arbitrary data from the database.

    While CISA has now tagged CVE-2026-1603 as exploited in the wild, Ivanti said it received no reports of exploitation when BleepingComputer reached out for confirmation on Monday.

    “We are not aware of any customers being exploited by these vulnerabilities prior to public disclosure. These vulnerabilities were disclosed through our responsible disclosure program,” Ivanti says in the original advisory.

    At the moment, the Shadowserver threat monitoring platform tracks over 700 Internet-facing Ivanti EPM instances, most of them in North America. However, there is no information on how many of them are still vulnerable to CVE-2026-1603 attacks.

    Ivanti EPM instances exposed on the internet
    Ivanti EPM instances exposed on the internet (Shadowserver)

    Although it didn’t provide any details on attacks exploiting this flaw, CISA added it to its Known Exploited Vulnerabilities (KEV) Catalog on Monday, warning that such security bugs are “frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.”

    The U.S. cybersecurity agency has also ordered Federal Civilian Executive Branch (FCEB) agencies to patch their systems within three weeks, by March 23, as mandated by a binding operational directive (BOD 22-01) issued in November 2021.

    While Ivanti has yet to find evidence of active CVE-2026-1603 exploitation, threat actors often target Ivanti EPM vulnerabilities in attacks.

    One year ago, CISA warned federal agencies to secure their networks against three other EPM flaws (CVE-2024-13159, CVE-2024-13160, and CVE-2024-13161) that were exploited in the wild.

    CISA also ordered U.S. government agencies to patch another actively exploited EPM flaw (CVE-2024-29824) in October 2024.

    Ivanti provides system and IT asset management products to more than 40,000 companies through a network of more than 7,000 partners worldwide.


    tines

    Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

    Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    The current state of prompt injections on the web

    April 29, 2026

    Microsoft to deprecate legacy TLS in Exchange Online starting July

    April 28, 2026

    Mythos Changed the Math on Vulnerability Discovery. Most Teams Aren’t Ready for the Remediation Side

    April 27, 2026

    US Busts Myanmar Ring Targeting US Citizens in Financial Fraud

    April 26, 2026

    ‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty – Krebs on Security

    April 25, 2026

    A burrow full of malware

    April 24, 2026
    Top Posts

    Understanding U-Net Architecture in Deep Learning

    November 25, 202533 Views

    Hard-braking events as indicators of road segment crash risk

    January 14, 202626 Views

    Redefining AI efficiency with extreme compression

    March 25, 202625 Views
    Don't Miss

    Duck Creek is entering its operating model era

    April 29, 2026

    Many Duck Creek programs are discovering that the hardest part in modernization begins after go-live.…

    Sparse AI Hardware Slashes Energy and Latency

    April 29, 2026

    Rogers to offer voluntary buyouts to 10,000 employees

    April 29, 2026

    Evolving image recognition with Geometric Deep Learning

    April 29, 2026
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    Duck Creek is entering its operating model era

    April 29, 2026

    Sparse AI Hardware Slashes Energy and Latency

    April 29, 2026

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2026 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.