Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Ivanti Warns of Active Exploitation in EPMM Vulnerability

Ivanti Warns of Active Exploitation in EPMM Vulnerability

Posted on May 7, 2026 By CWS

The cybersecurity landscape is once again under scrutiny as Ivanti issues a warning regarding a critical vulnerability in its Endpoint Manager Mobile (EPMM) software. This security loophole, identified as CVE-2026-6973 with a CVSS score of 7.2, has been actively exploited in the wild, raising alarms within the security community. The flaw is attributed to improper input validation, posing significant risks to versions of EPMM prior to 12.6.1.1, 12.7.0.1, and 12.8.0.1.

Details of the Vulnerability

According to Ivanti, the vulnerability allows a remotely authenticated user with administrative privileges to execute arbitrary code. This type of remote code execution (RCE) exploit can have severe consequences, potentially leading to unauthorized access and control over affected systems. The company has identified that only a limited number of clients have fallen victim to this exploit. Ivanti advises that customers who followed an earlier recommendation in January to rotate credentials associated with CVE-2026-1281 and CVE-2026-1340 are at a reduced risk.

Despite the active exploitation, the identities of the attackers and their objectives remain unknown. This uncertainty underscores the critical need for organizations to remain vigilant and proactive in their cybersecurity efforts.

Government Involvement and Additional Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has responded by including this vulnerability in its Known Exploited Vulnerabilities (KEV) catalog. This action mandates that Federal Civilian Executive Branch (FCEB) agencies implement necessary fixes by May 10, 2026, to protect their infrastructure. Ivanti has also addressed four additional vulnerabilities within EPMM, each carrying its own risks and requiring timely mitigation.

Among the patched vulnerabilities are CVE-2026-5786, CVE-2026-5787, CVE-2026-5788, and CVE-2026-7821, each involving issues ranging from improper access control to flawed certificate validation. These vulnerabilities, if left unaddressed, could allow unauthorized access, impersonation of Sentry hosts, and unauthorized device enrollment, among other threats.

Impact and Mitigation Measures

Ivanti has clarified that these issues are restricted to the on-premises version of EPMM and do not affect its cloud-based solutions such as Ivanti Neurons for MDM or other products like Ivanti EPM and Ivanti Sentry. This distinction is crucial for customers seeking to understand their risk exposure and the scope of necessary actions.

Organizations using the affected versions of EPMM are urged to apply the latest patches immediately and review their security protocols to prevent potential exploitation. By maintaining updated systems and adhering to recommended security practices, companies can mitigate the impact of these vulnerabilities and safeguard their digital assets.

The ongoing developments in this case highlight the ever-present need for robust cybersecurity measures and continuous monitoring to counteract evolving threats effectively.

The Hacker News Tags:admin access, bug fixes, CISA, CVE-2026-6973, Cybersecurity, EPMM, Exploit, input validation, Ivanti, network security, Patch, RCE, Vulnerability

Post navigation

Previous Post: Chinese Hackers Employ Custom Malware to Target Government Data
Next Post: Elon Musk and OpenAI’s Legal Clash Over AI’s Future

Related Posts

AI Security Lags Behind as Skills Fail to Evolve AI Security Lags Behind as Skills Fail to Evolve The Hacker News
North Korea-linked Supply Chain Attack Targets Developers with 35 Malicious npm Packages North Korea-linked Supply Chain Attack Targets Developers with 35 Malicious npm Packages The Hacker News
Google Launches Android Developer Verification Initiative Google Launches Android Developer Verification Initiative The Hacker News
Hackers Target Over 70 Microsoft Exchange Servers to Steal Credentials via Keyloggers Hackers Target Over 70 Microsoft Exchange Servers to Steal Credentials via Keyloggers The Hacker News
Why Organizations Are Abandoning Static Secrets for Managed Identities Why Organizations Are Abandoning Static Secrets for Managed Identities The Hacker News
Ex-Google Engineer Convicted for Stealing 2,000 AI Trade Secrets for China Startup Ex-Google Engineer Convicted for Stealing 2,000 AI Trade Secrets for China Startup The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Elon Musk and OpenAI’s Legal Clash Over AI’s Future
  • Ivanti Warns of Active Exploitation in EPMM Vulnerability
  • Chinese Hackers Employ Custom Malware to Target Government Data
  • AI Vision Models Vulnerable to Subtle Image Manipulations
  • Critical Cisco Vulnerability Exposes Networks to DoS Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Elon Musk and OpenAI’s Legal Clash Over AI’s Future
  • Ivanti Warns of Active Exploitation in EPMM Vulnerability
  • Chinese Hackers Employ Custom Malware to Target Government Data
  • AI Vision Models Vulnerable to Subtle Image Manipulations
  • Critical Cisco Vulnerability Exposes Networks to DoS Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark