The United States Agency for Infrastructure and Cybersecurity (CISA) has raised the alarm about high-gravity vulnerability in Ivanti Endpoint Manager (EPM) and has ordered federal agencies to apply patches within a period of time. 3 weeks. Registered as CVE-2026-1603, the failure allows remote attackers to draw authentication mechanisms and extract credentials through a cross-site scribing (XSS) attack that, according to the warnings, is of low complexity and does not require interaction by the user.
Ivanti EPM is an integral platform for managing endpoints and client devices in multiple operating systems and environments, including Windows, macOS, Linux, Chrome OS and IoT devices. This functional amplitude is precisely what makes your vulnerabilities an attractive target: a failure in the management server can result in access to tens or hundreds of managed equipment.

Ivanti published corrections about a month ago when he released the version Ivanti EPM 2024 SU5 which in addition to mitigating XSS corrects an SQL injection that could allow arbitrary data reading in the database. The company's statement details the available mitigations and download links in its security newsletter; it is available on its portal. official.
Although Ivanti noted that, until the publication of its notice and when it was consulted by the press, it had not received confirmed notifications of exploitation in customers, CISA decided to include vulnerability in its A catalogue of known exploited vulnerabilities (KEV) and described it as being used in real attacks, a decision that is often based on telemetry from multiple sources and observed attack patterns. CISA's own notice of new inclusion in the catalogue takes this addition and stresses that such failures are frequent vectors for malicious actors: see CISA statement and the specific entry in the catalogue can be consulted Here..
The potential scope of the problem is also reflected in public scans: the Shadowserver monitoring platform shows more than 700 instances of Ivanti EPM exposed on the Internet, mainly in North America, although there is no public data indicating how many of these instances are running vulnerable or already patched versions. The Shadowserver view offers an X-ray of the state of public exposure and can be reviewed on your dashboard: see Shadowserver statistics.
The federal authorities have not acted in isolation: inclusion in the KEV triggers a binding obligation for the civil executive agencies of the US Government. They must apply the correction within the time limit set by the operational directive. This requirement comes from BOD 22-01, the Department of National Security directive that sets times and priorities to mitigate vulnerabilities listed as exploited in nature; the full document is available on the DHS site: BOD 22-01.
It is important to put this episode in context: Ivanti and other endpoints managers have been recurring targets. In 2024, CISA already urged to secure networks against several active PMS failures, and in October of that year they also force the application of patches for another vulnerability of Ivanti detected in real environments. The reiteration of these incidents highlights two realities in the current cybersecurity landscape: on the one hand, central management tools concentrate potential impact; on the other, attack groups prioritize failures that allow initial access or exfiltration of credentials.

For security teams and infrastructure managers there are a number of practical steps that should be prioritized immediately. First, confirm whether any affected version of Ivanti EPM is being implemented and apply the patches published by the supplier. Then, if there are Internet-accessible instances, it is advisable to restrict external access by firewall and VPN, and to consider the temporary disconnection of exposed services while the correction is being used. It is also appropriate to review records and alerts to detect unusual activity around the administration panel, as well as to force the rotation of credentials and administrative keys to minimize the risk in the event of a leak. Finally, maintaining an in-depth defence policy - network segmentation, multifactor authentication and good privilege control - reduces the likelihood that an isolated vulnerability will scale up to compromise critical environments.
Ivanti provides services and products to tens of thousands of organizations through an extensive network of partners, which multiplies the importance of a coordinated and rapid response. The interaction between manufacturer notices, telemetry from organizations such as Shadowserver and agency warnings such as CISA is today the best line of defense to accelerate the mitigation of high-risk failures. If you administer EPM systems, the recommendation is clear: verify versions, apply patches and reduce public exposure without delay.
To expand technical information and follow the evolution of the incident, see the official sources linked to this text and be aware of the Ivanti bulletins and the updates of CISA, which reflect both the exploitation situation and the guidelines for responding in the federal and private environment.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...