Close Menu
geekfence.comgeekfence.com
    What's Hot

    Microsoft’s Windows Recall still allows silent data extraction – Computerworld

    April 16, 2026

    Louisiana bill targets online sweepstakes in crackdown

    April 16, 2026

    Nokia and Orange team up for AI RAN

    April 16, 2026
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»Cyber Security»Recently patched Ivanti EPM flaw now actively exploited
    Cyber Security

    Recently patched Ivanti EPM flaw now actively exploited

    AdminBy AdminMarch 10, 2026No Comments3 Mins Read5 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Recently patched Ivanti EPM flaw now actively exploited
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Recently patched Ivanti EPM flaw now actively exploited

    CISA flagged a high-severity Ivanti Endpoint Manager (EPM) vulnerability as actively exploited in attacks and ordered U.S. federal agencies to patch systems within three weeks.

    Ivanti’s EPM software is an all-in-one endpoint management solution for managing client devices across Windows, macOS, Linux, Chrome OS, and IoT platforms.

    Tracked as CVE-2026-1603, this security flaw can be exploited by remote threat actors without privileges to bypass authentication and steal credential data in low-complexity cross-site scripting attacks that require no user interaction.

    Ivanti patched the vulnerability one month ago, when it released Ivanti EPM 2024 SU5, which also addresses an SQL injection flaw that allows remote, authenticated attackers to read arbitrary data from the database.

    While CISA has now tagged CVE-2026-1603 as exploited in the wild, Ivanti said it received no reports of exploitation when BleepingComputer reached out for confirmation on Monday.

    “We are not aware of any customers being exploited by these vulnerabilities prior to public disclosure. These vulnerabilities were disclosed through our responsible disclosure program,” Ivanti says in the original advisory.

    At the moment, the Shadowserver threat monitoring platform tracks over 700 Internet-facing Ivanti EPM instances, most of them in North America. However, there is no information on how many of them are still vulnerable to CVE-2026-1603 attacks.

    Ivanti EPM instances exposed on the internet
    Ivanti EPM instances exposed on the internet (Shadowserver)

    Although it didn’t provide any details on attacks exploiting this flaw, CISA added it to its Known Exploited Vulnerabilities (KEV) Catalog on Monday, warning that such security bugs are “frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.”

    The U.S. cybersecurity agency has also ordered Federal Civilian Executive Branch (FCEB) agencies to patch their systems within three weeks, by March 23, as mandated by a binding operational directive (BOD 22-01) issued in November 2021.

    While Ivanti has yet to find evidence of active CVE-2026-1603 exploitation, threat actors often target Ivanti EPM vulnerabilities in attacks.

    One year ago, CISA warned federal agencies to secure their networks against three other EPM flaws (CVE-2024-13159, CVE-2024-13160, and CVE-2024-13161) that were exploited in the wild.

    CISA also ordered U.S. government agencies to patch another actively exploited EPM flaw (CVE-2024-29824) in October 2024.

    Ivanti provides system and IT asset management products to more than 40,000 companies through a network of more than 7,000 partners worldwide.


    tines

    Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

    Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    Here’s how to avoid a ‘second strike’

    April 16, 2026

    Adobe Issues Emergency Patch for Critical PDF Flaw Exploited For Months

    April 15, 2026

    Sustainability 101: Let’s talk about energy efficiency

    April 14, 2026

    LinkedIn is spying on you, and you agreed to nothing • Graham Cluley

    April 13, 2026

    Bringing Rust to the Pixel Baseband

    April 12, 2026

    ChatGPT rolls out new $100 Pro subscription to challenge Claude

    April 11, 2026
    Top Posts

    Understanding U-Net Architecture in Deep Learning

    November 25, 202529 Views

    Hard-braking events as indicators of road segment crash risk

    January 14, 202624 Views

    Redefining AI efficiency with extreme compression

    March 25, 202623 Views
    Don't Miss

    Microsoft’s Windows Recall still allows silent data extraction – Computerworld

    April 16, 2026

    “The short-term fix is fairly straightforward. Microsoft could add stronger code integrity and process protections…

    Louisiana bill targets online sweepstakes in crackdown

    April 16, 2026

    Nokia and Orange team up for AI RAN

    April 16, 2026

    AI Is Writing Our Code Faster Than We Can Verify It – O’Reilly

    April 16, 2026
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    Microsoft’s Windows Recall still allows silent data extraction – Computerworld

    April 16, 2026

    Louisiana bill targets online sweepstakes in crackdown

    April 16, 2026

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2026 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.