Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Ivanti Releases Crucial Patches for Endpoint Manager

Ivanti Releases Crucial Patches for Endpoint Manager

Posted on February 11, 2026 By CWS

Ivanti has released important security patches for its Endpoint Manager (EPM) software, addressing several vulnerabilities that were brought to light in October 2025. The update includes fixes for both high and medium severity issues that could be exploited remotely.

Key Vulnerabilities Addressed

Among the vulnerabilities, a significant one identified as CVE-2026-1603, is a high-severity authentication bypass flaw. This weakness could potentially expose credential data to unauthorized parties. Another medium-severity issue, tracked as CVE-2026-1602, involves an SQL injection defect. This particular vulnerability could allow attackers with authentication to access arbitrary data within the database.

The resolution of these vulnerabilities comes with the release of EPM 2024 SU5, which also addresses 11 other medium-severity issues disclosed in October. These problems, initially reported to Ivanti in November 2024, were highlighted by Trend Micro’s Zero Day Initiative, although they were not zero-day vulnerabilities in the technical sense.

Security Updates and Recommendations

Ivanti’s efforts to fix these security flaws include previous patches released in November 2025 for two high-severity vulnerabilities. The latest update completes the remediation of all outstanding issues. Importantly, Ivanti has stated that there are no known instances of these vulnerabilities being exploited in the wild. Nonetheless, users are strongly encouraged to upgrade to EPM 2024 SU5 without delay to ensure their systems remain protected.

Additionally, Ivanti has reminded users that EPM version 2022 is no longer supported, having reached its End of Life (EOL). Consequently, users should migrate to a supported version to continue receiving security updates.

Additional Advisory Updates

On the same day, Ivanti updated its advisory regarding two Endpoint Manager Mobile (EPMM) vulnerabilities, which have been exploited as zero-days. These vulnerabilities are tracked as CVE-2026-1281 and CVE-2026-1340 and have a CVSS score of 9.8, indicating their critical nature. They have been used for unauthenticated remote code execution, allowing attackers to deploy web shells and reverse shells for persistence.

Ivanti’s advisory now includes indicators of compromise (IoCs) and a detection script to assist users in identifying potential breaches. The company has also provided guidance to manage false positives in detection.

Staying informed about security updates such as these is crucial in maintaining robust cybersecurity defenses. Users are urged to apply the latest patches promptly and to remain vigilant against potential threats.

Security Week News Tags:authentication bypass, CVE-2026-1602, CVE-2026-1603, Cybersecurity, Endpoint Manager, EPM 2024 SU5, Ivanti, security patches, software updates, SQL injection, Vulnerabilities, zero-day

Post navigation

Previous Post: Cybercriminals Exploit AI to Distribute macOS Malware
Next Post: New Ransomware Threats BQTLock and GREENBLOOD Emerge

Related Posts

ICS Patch Tuesday: Fixes Announced by Siemens, Schneider, Rockwell, ABB, Phoenix Contact ICS Patch Tuesday: Fixes Announced by Siemens, Schneider, Rockwell, ABB, Phoenix Contact Security Week News
Google’s  Billion Wiz Deal Draws DOJ Antitrust Scrutiny: Report Google’s $32 Billion Wiz Deal Draws DOJ Antitrust Scrutiny: Report Security Week News
Dux Emerges From Stealth Mode With  Million in Funding Dux Emerges From Stealth Mode With $9 Million in Funding Security Week News
‘MadeYouReset’ HTTP2 Vulnerability Enables Massive DDoS Attacks ‘MadeYouReset’ HTTP2 Vulnerability Enables Massive DDoS Attacks Security Week News
Over 100 Organizations Targeted in ShinyHunters Phishing Campaign Over 100 Organizations Targeted in ShinyHunters Phishing Campaign Security Week News
Order out of Chaos – Using Chaos Theory Encryption to Protect OT and IoT Order out of Chaos – Using Chaos Theory Encryption to Protect OT and IoT Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VoidLink Framework Enables Dynamic Linux Tool Deployment
  • Massive Cyberattack Targets Trusted Platforms with Malware
  • Rising Cyber Threats Challenge Defense Sector Security
  • Nevada Introduces New Data Classification Policy
  • New Ransomware Threats BQTLock and GREENBLOOD Emerge

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VoidLink Framework Enables Dynamic Linux Tool Deployment
  • Massive Cyberattack Targets Trusted Platforms with Malware
  • Rising Cyber Threats Challenge Defense Sector Security
  • Nevada Introduces New Data Classification Policy
  • New Ransomware Threats BQTLock and GREENBLOOD Emerge

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark