Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Ivanti Update Fixes Endpoint Manager Vulnerabilities

Critical Ivanti Update Fixes Endpoint Manager Vulnerabilities

Posted on February 10, 2026 By CWS

Ivanti’s Response to Critical Security Flaws

Ivanti has released crucial security updates for its Endpoint Manager (EPM) platform, addressing two significant vulnerabilities that posed a risk of unauthorized access to sensitive data and potential compromise of user credentials. These updates, included in the 2024 SU5 version, also resolve 11 medium-severity vulnerabilities previously identified in October 2025.

Details of the Security Vulnerabilities

The security advisory from Ivanti identifies two primary vulnerabilities of concern. The first, known as CVE-2026-1603, is an authentication bypass issue with a CVSS score of 8.6, categorized as High severity. This flaw allows remote attackers to access stored credential data without requiring authentication, posing a significant risk due to its ease of exploitation over a network.

The second vulnerability, CVE-2026-1602, rated with a CVSS score of 6.5 (Medium), involves a SQL injection flaw. This weakness enables remote authenticated users to read arbitrary data from the database, potentially exposing sensitive organizational information. Although this vulnerability affects data confidentiality, it does not compromise system integrity or availability.

Implications for Enterprise Security

Organizations using Ivanti Endpoint Manager version 2024 SU4 SR1 and earlier are at risk from these vulnerabilities. The issues affect core authentication and database query mechanisms, making them particularly concerning for enterprises managing multiple endpoints. The authentication bypass vulnerability is especially alarming due to its potential to provide attackers with initial access to credential stores without prior authentication.

Ivanti has released the patched version, EPM 2024 SU5, through its Ivanti License System (ILS), urging administrators to apply the update immediately to mitigate potential risks. The company has reported no active exploitation observed prior to the vulnerabilities’ public disclosure, which were identified through Ivanti’s responsible disclosure program.

Collaborative Efforts and Future Outlook

The vulnerabilities were discovered by a security researcher collaborating with the Trend Zero Day Initiative, and Ivanti has publicly acknowledged the researcher’s contributions. This highlights the importance of collaboration with the security community to maintain the integrity of enterprise software.

With no known exploitation in the wild, the disclosure of technical details increases the urgency for organizations to deploy these patches. Enterprises using Ivanti Endpoint Manager are advised to prioritize updating to version 2024 SU5 and conduct thorough security audits to ensure no unauthorized access occurred prior to patching.

Ivanti continues to encourage the reporting of vulnerabilities through its official channels and remains committed to enhancing its products’ security. For ongoing updates, follow Ivanti on Google News, LinkedIn, and X, and contact us to share your cybersecurity stories.

Cyber Security News Tags:authentication bypass, Cybersecurity, database security, Endpoint Manager, enterprise software, Ivanti, patch management, security update, SQL injection, Vulnerability

Post navigation

Previous Post: Pakistan-Linked Cyber Espionage Targets India’s Defense
Next Post: Reco Secures $30M to Boost AI SaaS Security Solutions

Related Posts

New MobileGestalt Exploit for iOS 26.0.1 Enables Unauthorized Writes to Protected Data New MobileGestalt Exploit for iOS 26.0.1 Enables Unauthorized Writes to Protected Data Cyber Security News
12 Best Infrastructure Monitoring Tools in 2025 12 Best Infrastructure Monitoring Tools in 2025 Cyber Security News
APT SideWinder Actor Profile – Recent Attacks, Tactics, Techniques, and Procedures APT SideWinder Actor Profile – Recent Attacks, Tactics, Techniques, and Procedures Cyber Security News
VirusTotal Simplifies User Options With Platform Access And New Contributor Model VirusTotal Simplifies User Options With Platform Access And New Contributor Model Cyber Security News
CISA Retires Ten Emergency Directives Following Milestone Achievement CISA Retires Ten Emergency Directives Following Milestone Achievement Cyber Security News
Microsoft Azure Cloud Disrupted by Undersea Cable Cuts in Red Sea Microsoft Azure Cloud Disrupted by Undersea Cable Cuts in Red Sea Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Vulnerabilities Found in Intel’s TDX by Google
  • Socelars Malware Targets Windows for Data Theft
  • Siemens, Schneider, and Others Address ICS Vulnerabilities
  • North Korea-Linked UNC1069 Targets Crypto with AI Attacks
  • GitLab Releases Critical Security Updates to Fix Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Vulnerabilities Found in Intel’s TDX by Google
  • Socelars Malware Targets Windows for Data Theft
  • Siemens, Schneider, and Others Address ICS Vulnerabilities
  • North Korea-Linked UNC1069 Targets Crypto with AI Attacks
  • GitLab Releases Critical Security Updates to Fix Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark