Critical Ivanti Endpoint Manager Vulnerabilities Actively Exploited

Related

Iowa’s Cybersecurity Leadership Spotlight

Iowa’s cybersecurity leadership spans enterprise software, financial services, state...

Wyoming’s Cybersecurity Leadership Spotlight

Wyoming’s cybersecurity leadership spans higher education, state government, community...

West Virginia’s Cybersecurity Leadership Spotlight

West Virginia’s cybersecurity leadership spans state government, higher education,...

South Dakota’s Cybersecurity Leadership Spotlight

South Dakota’s cybersecurity leadership spans banking, higher education, consulting,...

Share

What happened

Ivanti disclosed two critical vulnerabilities affecting Endpoint Manager Mobile that are being actively exploited in real-world attacks. The flaws enable unauthenticated remote code execution on on-premises deployments through code injection weaknesses. Ivanti released patches addressing both issues after confirming exploitation activity.

Who is affected

Organizations running unpatched Ivanti Endpoint Manager Mobile instances are directly exposed to exploitation.

Why CISOs should care

Active exploitation of unauthenticated remote code execution vulnerabilities presents immediate risk to enterprise device management infrastructure.

3 practical actions

  • Apply Ivanti security patches. Update all affected Endpoint Manager Mobile deployments.
  • Inventory EPMM instances. Identify exposed on-premises systems.
  • Confirm remediation. Validate that vulnerable versions are no longer in use.