Close Menu
geekfence.comgeekfence.com
    What's Hot

    Vivo V70 FE 5G Launched with Dimensity 7360 Turbo Chip

    March 10, 2026

    ChatGPT as a therapist? New study reveals serious ethical risks

    March 10, 2026

    Unique Capabilities of Edge Computing in IoT

    March 10, 2026
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»Cyber Security»Recently patched Ivanti EPM flaw now actively exploited
    Cyber Security

    Recently patched Ivanti EPM flaw now actively exploited

    AdminBy AdminMarch 10, 2026No Comments3 Mins Read0 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Recently patched Ivanti EPM flaw now actively exploited
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Recently patched Ivanti EPM flaw now actively exploited

    CISA flagged a high-severity Ivanti Endpoint Manager (EPM) vulnerability as actively exploited in attacks and ordered U.S. federal agencies to patch systems within three weeks.

    Ivanti’s EPM software is an all-in-one endpoint management solution for managing client devices across Windows, macOS, Linux, Chrome OS, and IoT platforms.

    Tracked as CVE-2026-1603, this security flaw can be exploited by remote threat actors without privileges to bypass authentication and steal credential data in low-complexity cross-site scripting attacks that require no user interaction.

    Ivanti patched the vulnerability one month ago, when it released Ivanti EPM 2024 SU5, which also addresses an SQL injection flaw that allows remote, authenticated attackers to read arbitrary data from the database.

    While CISA has now tagged CVE-2026-1603 as exploited in the wild, Ivanti said it received no reports of exploitation when BleepingComputer reached out for confirmation on Monday.

    “We are not aware of any customers being exploited by these vulnerabilities prior to public disclosure. These vulnerabilities were disclosed through our responsible disclosure program,” Ivanti says in the original advisory.

    At the moment, the Shadowserver threat monitoring platform tracks over 700 Internet-facing Ivanti EPM instances, most of them in North America. However, there is no information on how many of them are still vulnerable to CVE-2026-1603 attacks.

    Ivanti EPM instances exposed on the internet
    Ivanti EPM instances exposed on the internet (Shadowserver)

    Although it didn’t provide any details on attacks exploiting this flaw, CISA added it to its Known Exploited Vulnerabilities (KEV) Catalog on Monday, warning that such security bugs are “frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.”

    The U.S. cybersecurity agency has also ordered Federal Civilian Executive Branch (FCEB) agencies to patch their systems within three weeks, by March 23, as mandated by a binding operational directive (BOD 22-01) issued in November 2021.

    While Ivanti has yet to find evidence of active CVE-2026-1603 exploitation, threat actors often target Ivanti EPM vulnerabilities in attacks.

    One year ago, CISA warned federal agencies to secure their networks against three other EPM flaws (CVE-2024-13159, CVE-2024-13160, and CVE-2024-13161) that were exploited in the wild.

    CISA also ordered U.S. government agencies to patch another actively exploited EPM flaw (CVE-2024-29824) in October 2024.

    Ivanti provides system and IT asset management products to more than 40,000 companies through a network of more than 7,000 partners worldwide.


    tines

    Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

    Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    Can the Security Platform Finally Deliver for the Mid-Market?

    March 9, 2026

    ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA – Krebs on Security

    March 8, 2026

    What cybersecurity actually does for your business

    March 7, 2026

    Hackers Used New Exploit Kit to Compromise Thousands of iPhones

    March 6, 2026

    February 2026 – Month of Smart Connections

    March 5, 2026

    They seized $4.8m in crypto… then gave the master key to the internet

    March 4, 2026
    Top Posts

    Hard-braking events as indicators of road segment crash risk

    January 14, 202619 Views

    Understanding U-Net Architecture in Deep Learning

    November 25, 202518 Views

    How to integrate a graph database into your RAG pipeline

    February 8, 202610 Views
    Don't Miss

    Vivo V70 FE 5G Launched with Dimensity 7360 Turbo Chip

    March 10, 2026

    Vivo V70 FE 5G has finally launched. This launch took place internationally in Indonesia, and…

    ChatGPT as a therapist? New study reveals serious ethical risks

    March 10, 2026

    Unique Capabilities of Edge Computing in IoT

    March 10, 2026

    Being the Human API: My Journey as a Developer Advocate

    March 10, 2026
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    Vivo V70 FE 5G Launched with Dimensity 7360 Turbo Chip

    March 10, 2026

    ChatGPT as a therapist? New study reveals serious ethical risks

    March 10, 2026

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2026 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.