Close Menu
geekfence.comgeekfence.com
    What's Hot

    Best Kids’ Headphones: Protect Your Child’s Hearing

    March 30, 2026

    Identity-first AI governance: Securing the agentic workforce

    March 30, 2026

    Why AI Data Readiness Is Becoming the Most Critical Layer in Modern Analytics

    March 30, 2026
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»Cyber Security»Recently patched Ivanti EPM flaw now actively exploited
    Cyber Security

    Recently patched Ivanti EPM flaw now actively exploited

    AdminBy AdminMarch 10, 2026No Comments3 Mins Read5 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Recently patched Ivanti EPM flaw now actively exploited
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Recently patched Ivanti EPM flaw now actively exploited

    CISA flagged a high-severity Ivanti Endpoint Manager (EPM) vulnerability as actively exploited in attacks and ordered U.S. federal agencies to patch systems within three weeks.

    Ivanti’s EPM software is an all-in-one endpoint management solution for managing client devices across Windows, macOS, Linux, Chrome OS, and IoT platforms.

    Tracked as CVE-2026-1603, this security flaw can be exploited by remote threat actors without privileges to bypass authentication and steal credential data in low-complexity cross-site scripting attacks that require no user interaction.

    Ivanti patched the vulnerability one month ago, when it released Ivanti EPM 2024 SU5, which also addresses an SQL injection flaw that allows remote, authenticated attackers to read arbitrary data from the database.

    While CISA has now tagged CVE-2026-1603 as exploited in the wild, Ivanti said it received no reports of exploitation when BleepingComputer reached out for confirmation on Monday.

    “We are not aware of any customers being exploited by these vulnerabilities prior to public disclosure. These vulnerabilities were disclosed through our responsible disclosure program,” Ivanti says in the original advisory.

    At the moment, the Shadowserver threat monitoring platform tracks over 700 Internet-facing Ivanti EPM instances, most of them in North America. However, there is no information on how many of them are still vulnerable to CVE-2026-1603 attacks.

    Ivanti EPM instances exposed on the internet
    Ivanti EPM instances exposed on the internet (Shadowserver)

    Although it didn’t provide any details on attacks exploiting this flaw, CISA added it to its Known Exploited Vulnerabilities (KEV) Catalog on Monday, warning that such security bugs are “frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.”

    The U.S. cybersecurity agency has also ordered Federal Civilian Executive Branch (FCEB) agencies to patch their systems within three weeks, by March 23, as mandated by a binding operational directive (BOD 22-01) issued in November 2021.

    While Ivanti has yet to find evidence of active CVE-2026-1603 exploitation, threat actors often target Ivanti EPM vulnerabilities in attacks.

    One year ago, CISA warned federal agencies to secure their networks against three other EPM flaws (CVE-2024-13159, CVE-2024-13160, and CVE-2024-13161) that were exploited in the wild.

    CISA also ordered U.S. government agencies to patch another actively exploited EPM flaw (CVE-2024-29824) in October 2024.

    Ivanti provides system and IT asset management products to more than 40,000 companies through a network of more than 7,000 partners worldwide.


    tines

    Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

    Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    AI Upgrades, Security Breaches, and Industry Shifts Define This Week in Tech

    March 30, 2026

    Why Professional Skills Matter in the Age of AI

    March 29, 2026

    Never knock on the door of a nuclear submarine base and ask for a selfie • Graham Cluley

    March 28, 2026

    Implementing Post-Quantum Cryptography in Android

    March 27, 2026

    Coruna iOS exploit framework linked to Triangulation attacks

    March 26, 2026

    The Kill Chain Is Obsolete When Your AI Agent Is the Threat

    March 25, 2026
    Top Posts

    Understanding U-Net Architecture in Deep Learning

    November 25, 202527 Views

    Hard-braking events as indicators of road segment crash risk

    January 14, 202624 Views

    Redefining AI efficiency with extreme compression

    March 25, 202620 Views
    Don't Miss

    Best Kids’ Headphones: Protect Your Child’s Hearing

    March 30, 2026

    Choosing the best headphones for your children is important because using the wrong ones could…

    Identity-first AI governance: Securing the agentic workforce

    March 30, 2026

    Why AI Data Readiness Is Becoming the Most Critical Layer in Modern Analytics

    March 30, 2026

    Facial Recognition Errors Affect Millions Globally

    March 30, 2026
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    Best Kids’ Headphones: Protect Your Child’s Hearing

    March 30, 2026

    Identity-first AI governance: Securing the agentic workforce

    March 30, 2026

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2026 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.