Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Ivanti EPMM Exploited by Single IP with RCE Vulnerability

Ivanti EPMM Exploited by Single IP with RCE Vulnerability

Posted on February 16, 2026 By CWS

A major security flaw in Ivanti Endpoint Manager Mobile (EPMM), identified as CVE-2026-1281, is currently being exploited at a significant rate. Recent data from GreyNoise indicates that a staggering 83% of these attacks can be traced back to a single IP address: 193[.]24[.]123[.]42.

Primary Exploiting IP and Its Characteristics

The IP in question is associated with PROSPERO OOO (AS200593) and has been characterized as offering “bulletproof” hosting by Censys. It is noteworthy that this IP was absent from several of the initial indicators of compromise (IOCs) provided to cybersecurity defenders.

The exploitation of Ivanti EPMM is predominantly driven by this IP, which underscores the need for vigilance among organizations using the affected software.

Understanding the Vulnerabilities

The critical vulnerability, CVE-2026-1281, has a CVSS score of 9.8 and allows unauthorized attackers to execute commands by manipulating Bash arithmetic expansion within backend scripts. In addition to this, another vulnerability, CVE-2026-1340, presents a similar risk in a different component of the EPMM system.

On January 29, Ivanti issued a security advisory regarding these vulnerabilities. Shortly thereafter, the Cybersecurity and Infrastructure Security Agency (CISA) included CVE-2026-1281 in its catalog of Known Exploited Vulnerabilities, highlighting the urgency of addressing these issues.

Impact and Patterns of Attack

Between February 1 and 9, GreyNoise recorded 417 distinct exploitation attempts involving eight different IP addresses. Notably, February 8 saw 269 exploitation sessions, markedly higher than the preceding daily averages.

The primary IP, 193[.]24[.]123[.]42, has also been implicated in attacks on Oracle WebLogic Server, GNU Inetutils telnetd, and GLPI. The use of numerous user-agent strings suggests a strategy of automated mass exploitation.

Challenges in Detection and Mitigation

Many shared IOCs did not align with data on Ivanti exploitation. For example, although Windscribe VPN exit nodes generated significant traffic, they did not target Ivanti EPMM specifically. Similarly, a residential router was identified with limited activity.

Organizations focusing on blocking only these VPN or residential IPs may overlook the primary threat source, which is the AS200593 network.

Furthermore, approximately 85% of observed payloads employed DNS callbacks for code execution confirmation without immediately deploying malware. This behavior aligns with tactics used by initial access brokers, suggesting a sophisticated level of threat.

Additionally, “sleeper” webshells located at /mifs/403.jsp might persist undetected in systems even after patching, if attackers had prior access.

Stay informed on the latest cybersecurity developments by following us on Google News, LinkedIn, and X. For those interested in sharing their stories, please get in touch with us.

Cyber Security News Tags:CISA, CVE-2026-1281, Cybersecurity, Dutch authorities, GreyNoise, Ivanti EPMM, Oracle WebLogic Server, PROSPERO OOO, RCE vulnerability, single IP attack

Post navigation

Previous Post: CISA Faces Challenges Amid DHS Shutdown
Next Post: ZeroDayRAT Spyware Threatens Android and iOS Security

Related Posts

Hackers Attacking Fortinet SSL VPN Under Attack From 780 unique IPs Hackers Attacking Fortinet SSL VPN Under Attack From 780 unique IPs Cyber Security News
Microsoft Releases Windows 11 Cumulative Updates (KB5063878, KB5063875) August 2025 with New Features Microsoft Releases Windows 11 Cumulative Updates (KB5063878, KB5063875) August 2025 with New Features Cyber Security News
BADBOX 2.0 Infected Over 1 Million Android Devices Worldwide BADBOX 2.0 Infected Over 1 Million Android Devices Worldwide Cyber Security News
Threat Actors Leverage Oracle Database Scheduler to Gain Access to Corporate Environments Threat Actors Leverage Oracle Database Scheduler to Gain Access to Corporate Environments Cyber Security News
Microsoft Confirms UAC Bug Breaks App Install On Windows 11 And 10 Versions Microsoft Confirms UAC Bug Breaks App Install On Windows 11 And 10 Versions Cyber Security News
MediaTek July 2025 Security Update Patches Vulnerabilities Affecting a Wide Range of Their Chipsets MediaTek July 2025 Security Update Patches Vulnerabilities Affecting a Wide Range of Their Chipsets Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Airleader Vulnerability Poses Remote Code Execution Risk
  • Palo Alto Networks Finalizes $25B CyberArk Acquisition
  • LockBit 5.0 Targets Multiple Systems with Enhanced Ransomware
  • Cloud Password Managers Face Security Challenges
  • Noodlophile Malware Uses Fake Jobs to Evade Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Airleader Vulnerability Poses Remote Code Execution Risk
  • Palo Alto Networks Finalizes $25B CyberArk Acquisition
  • LockBit 5.0 Targets Multiple Systems with Enhanced Ransomware
  • Cloud Password Managers Face Security Challenges
  • Noodlophile Malware Uses Fake Jobs to Evade Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News