Critical Ivanti Endpoint Manager Vulnerabilities Actively Exploited

Related

BlackIce Red Teaming Toolkit Released for AI Security Testing

What happened Databricks introduced BlackIce, a containerized toolkit designed to...

FortiCloud SSO Authentication Bypass Exploited

What happened An authentication bypass vulnerability affecting FortiCloud Single Sign-On...

31.4 Tbps DDoS Attack Sets New Record

What happened A distributed denial-of-service campaign reached a peak traffic...

Matanbuchus Malware Downloader Evading AV Detection

What happened The Matanbuchus malware downloader has reappeared with updated...

Australia’s Healthcare Cybersecurity Leaders to Watch

The Australian healthcare sector has never faced more scrutiny...

Share

What happened

Ivanti disclosed two critical vulnerabilities affecting Endpoint Manager Mobile that are being actively exploited in real-world attacks. The flaws enable unauthenticated remote code execution on on-premises deployments through code injection weaknesses. Ivanti released patches addressing both issues after confirming exploitation activity.

Who is affected

Organizations running unpatched Ivanti Endpoint Manager Mobile instances are directly exposed to exploitation.

Why CISOs should care

Active exploitation of unauthenticated remote code execution vulnerabilities presents immediate risk to enterprise device management infrastructure.

3 practical actions

  • Apply Ivanti security patches. Update all affected Endpoint Manager Mobile deployments.
  • Inventory EPMM instances. Identify exposed on-premises systems.
  • Confirm remediation. Validate that vulnerable versions are no longer in use.