Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Ivanti Update Fixes Endpoint Manager Vulnerabilities

Critical Ivanti Update Fixes Endpoint Manager Vulnerabilities

Posted on February 10, 2026 By CWS

Ivanti’s Response to Critical Security Flaws

Ivanti has released crucial security updates for its Endpoint Manager (EPM) platform, addressing two significant vulnerabilities that posed a risk of unauthorized access to sensitive data and potential compromise of user credentials. These updates, included in the 2024 SU5 version, also resolve 11 medium-severity vulnerabilities previously identified in October 2025.

Details of the Security Vulnerabilities

The security advisory from Ivanti identifies two primary vulnerabilities of concern. The first, known as CVE-2026-1603, is an authentication bypass issue with a CVSS score of 8.6, categorized as High severity. This flaw allows remote attackers to access stored credential data without requiring authentication, posing a significant risk due to its ease of exploitation over a network.

The second vulnerability, CVE-2026-1602, rated with a CVSS score of 6.5 (Medium), involves a SQL injection flaw. This weakness enables remote authenticated users to read arbitrary data from the database, potentially exposing sensitive organizational information. Although this vulnerability affects data confidentiality, it does not compromise system integrity or availability.

Implications for Enterprise Security

Organizations using Ivanti Endpoint Manager version 2024 SU4 SR1 and earlier are at risk from these vulnerabilities. The issues affect core authentication and database query mechanisms, making them particularly concerning for enterprises managing multiple endpoints. The authentication bypass vulnerability is especially alarming due to its potential to provide attackers with initial access to credential stores without prior authentication.

Ivanti has released the patched version, EPM 2024 SU5, through its Ivanti License System (ILS), urging administrators to apply the update immediately to mitigate potential risks. The company has reported no active exploitation observed prior to the vulnerabilities’ public disclosure, which were identified through Ivanti’s responsible disclosure program.

Collaborative Efforts and Future Outlook

The vulnerabilities were discovered by a security researcher collaborating with the Trend Zero Day Initiative, and Ivanti has publicly acknowledged the researcher’s contributions. This highlights the importance of collaboration with the security community to maintain the integrity of enterprise software.

With no known exploitation in the wild, the disclosure of technical details increases the urgency for organizations to deploy these patches. Enterprises using Ivanti Endpoint Manager are advised to prioritize updating to version 2024 SU5 and conduct thorough security audits to ensure no unauthorized access occurred prior to patching.

Ivanti continues to encourage the reporting of vulnerabilities through its official channels and remains committed to enhancing its products’ security. For ongoing updates, follow Ivanti on Google News, LinkedIn, and X, and contact us to share your cybersecurity stories.

Cyber Security News Tags:authentication bypass, Cybersecurity, database security, Endpoint Manager, enterprise software, Ivanti, patch management, security update, SQL injection, Vulnerability

Post navigation

Previous Post: Pakistan-Linked Cyber Espionage Targets India’s Defense
Next Post: Reco Secures $30M to Boost AI SaaS Security Solutions

Related Posts

Sophisticated DevilsTongue Windows Spyware Tracking Users Globally Sophisticated DevilsTongue Windows Spyware Tracking Users Globally Cyber Security News
Azure API Vulnerabilities Leak VPN Keys and Built-In Roles Allow Over-Privileged Access Azure API Vulnerabilities Leak VPN Keys and Built-In Roles Allow Over-Privileged Access Cyber Security News
North Korean Hackers Trick Users With Weaponized Zoom Apps to Execute System-Takeover Commands North Korean Hackers Trick Users With Weaponized Zoom Apps to Execute System-Takeover Commands Cyber Security News
Critical XSS Flaw in FortiSandbox Enables Remote Attacks Critical XSS Flaw in FortiSandbox Enables Remote Attacks Cyber Security News
New Cephalus Ransomware Leverages Remote Desktop Protocol to Gain Initial Access New Cephalus Ransomware Leverages Remote Desktop Protocol to Gain Initial Access Cyber Security News
Role of Threat Intelligence in Proactive Defense Strategies Role of Threat Intelligence in Proactive Defense Strategies Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News