Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Ivanti Releases Crucial Patches for Endpoint Manager

Ivanti Releases Crucial Patches for Endpoint Manager

Posted on February 11, 2026 By CWS

Ivanti has released important security patches for its Endpoint Manager (EPM) software, addressing several vulnerabilities that were brought to light in October 2025. The update includes fixes for both high and medium severity issues that could be exploited remotely.

Key Vulnerabilities Addressed

Among the vulnerabilities, a significant one identified as CVE-2026-1603, is a high-severity authentication bypass flaw. This weakness could potentially expose credential data to unauthorized parties. Another medium-severity issue, tracked as CVE-2026-1602, involves an SQL injection defect. This particular vulnerability could allow attackers with authentication to access arbitrary data within the database.

The resolution of these vulnerabilities comes with the release of EPM 2024 SU5, which also addresses 11 other medium-severity issues disclosed in October. These problems, initially reported to Ivanti in November 2024, were highlighted by Trend Micro’s Zero Day Initiative, although they were not zero-day vulnerabilities in the technical sense.

Security Updates and Recommendations

Ivanti’s efforts to fix these security flaws include previous patches released in November 2025 for two high-severity vulnerabilities. The latest update completes the remediation of all outstanding issues. Importantly, Ivanti has stated that there are no known instances of these vulnerabilities being exploited in the wild. Nonetheless, users are strongly encouraged to upgrade to EPM 2024 SU5 without delay to ensure their systems remain protected.

Additionally, Ivanti has reminded users that EPM version 2022 is no longer supported, having reached its End of Life (EOL). Consequently, users should migrate to a supported version to continue receiving security updates.

Additional Advisory Updates

On the same day, Ivanti updated its advisory regarding two Endpoint Manager Mobile (EPMM) vulnerabilities, which have been exploited as zero-days. These vulnerabilities are tracked as CVE-2026-1281 and CVE-2026-1340 and have a CVSS score of 9.8, indicating their critical nature. They have been used for unauthenticated remote code execution, allowing attackers to deploy web shells and reverse shells for persistence.

Ivanti’s advisory now includes indicators of compromise (IoCs) and a detection script to assist users in identifying potential breaches. The company has also provided guidance to manage false positives in detection.

Staying informed about security updates such as these is crucial in maintaining robust cybersecurity defenses. Users are urged to apply the latest patches promptly and to remain vigilant against potential threats.

Security Week News Tags:authentication bypass, CVE-2026-1602, CVE-2026-1603, Cybersecurity, Endpoint Manager, EPM 2024 SU5, Ivanti, security patches, software updates, SQL injection, Vulnerabilities, zero-day

Post navigation

Previous Post: Cybercriminals Exploit AI to Distribute macOS Malware
Next Post: New Ransomware Threats BQTLock and GREENBLOOD Emerge

Related Posts

GitHub Boosting Security in Response to NPM Supply Chain Attacks  GitHub Boosting Security in Response to NPM Supply Chain Attacks  Security Week News
Cisco Patches Vulnerability Exploited by Chinese Hackers Cisco Patches Vulnerability Exploited by Chinese Hackers Security Week News
Cloaked Secures 5M to Boost Privacy Tools and Enterprise Expansion Cloaked Secures $375M to Boost Privacy Tools and Enterprise Expansion Security Week News
ChatGPT’s Calendar Integration Can Be Exploited to Steal Emails ChatGPT’s Calendar Integration Can Be Exploited to Steal Emails Security Week News
New Wave of Attacks Targeting FortiGate Firewalls New Wave of Attacks Targeting FortiGate Firewalls Security Week News
Google Sues Operators of 10-Million-Device Badbox 2.0 Botnet Google Sues Operators of 10-Million-Device Badbox 2.0 Botnet Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark