Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Ivanti EPMM Security Flaw Exploited by Single IP Source

Ivanti EPMM Security Flaw Exploited by Single IP Source

Posted on February 12, 2026 By CWS

A newly discovered vulnerability in Ivanti Endpoint Manager Mobile (EPMM) is being heavily exploited, with most attempts traced back to a single IP address linked to a bulletproof hosting provider named PROSPERO. According to GreyNoise, a threat intelligence organization, 83% of the 417 exploitation sessions detected between February 1 and 9, 2026, originated from the IP address 193.24.123[.]42.

Exploit Details and Impact

The vulnerability in question, identified as CVE-2026-1281, holds a critical CVSS score of 9.8 and is one of two severe flaws in EPMM. The second flaw, CVE-2026-1340, also presents a risk of unauthenticated remote code execution. Ivanti has acknowledged that a limited number of customers have been affected by these zero-day exploits.

European agencies such as the Dutch Data Protection Authority, the European Commission, and Finland’s Valtori have reported being targeted by threat actors leveraging these vulnerabilities. The exploitation is characterized by the use of over 300 unique user agent strings, indicating automated tools are in play.

Connection to Broader Threat Activities

Further investigation reveals that the same IP address is engaging in attacks on three other CVEs across different software platforms. GreyNoise underscores that the automation of these attacks aligns with practices observed in other cyber threats.

PROSPERO, the hosting service tied to the IP, is linked with Proton66, an autonomous system known for distributing malicious software like GootLoader and Matanbuchus. Approximately 85% of the exploit attempts utilized the domain name system (DNS) to verify vulnerabilities without deploying malware, suggesting a focus on gathering intelligence for potential future attacks.

Protective Measures and Recommendations

In light of these findings, cybersecurity experts recommend that Ivanti EPMM users apply available patches promptly, inspect their Mobile Device Management (MDM) infrastructure, and scrutinize DNS logs for signs of exploitation activities. Monitoring the /mifs/403.jsp path on EPMM systems and blocking PROSPERO’s autonomous system (AS200593) at network perimeters is advised.

GreyNoise highlights the significant risk posed by compromised EPMM systems, which could enable lateral movement within organizational networks, bypassing traditional security measures. Organizations with internet-facing MDM or remote access systems should assume vulnerabilities will be exploited shortly after discovery.

In conclusion, the exploitation of Ivanti EPMM’s vulnerabilities by a single IP address underscores the need for heightened security measures and quick patch management to mitigate potential breaches.

The Hacker News Tags:bulletproof hosting, CVE-2026-1281, Cybersecurity, GreyNoise, initial access broker, Ivanti EPMM, PROSPERO, remote code execution, security flaw, threat intelligence

Post navigation

Previous Post: Hackers Exploit Google Calendar for AI Security Breach
Next Post: Nucleus Secures $20M for Advanced Exposure Management

Related Posts

A Look Inside Pillar’s AI Security Platform A Look Inside Pillar’s AI Security Platform The Hacker News
Amazon Uncovers Attacks Exploited Cisco ISE and Citrix NetScaler as Zero-Day Flaws Amazon Uncovers Attacks Exploited Cisco ISE and Citrix NetScaler as Zero-Day Flaws The Hacker News
U.S. Secret Service Seizes 300 SIM Servers, 100K Cards Threatening U.S. Officials Near UN U.S. Secret Service Seizes 300 SIM Servers, 100K Cards Threatening U.S. Officials Near UN The Hacker News
Sophos and SonicWall Patch Critical RCE Flaws Affecting Firewalls and SMA 100 Devices Sophos and SonicWall Patch Critical RCE Flaws Affecting Firewalls and SMA 100 Devices The Hacker News
AI-Driven Cyber Threats Escalate: Key Exploits Revealed AI-Driven Cyber Threats Escalate: Key Exploits Revealed The Hacker News
Google Ordered to Pay 4M for Misusing Android Users’ Cellular Data Without Permission Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark