{"id":16197,"date":"2026-05-08T21:02:14","date_gmt":"2026-05-08T21:02:14","guid":{"rendered":"https:\/\/newestek.com\/?p=16197"},"modified":"2026-05-08T21:02:14","modified_gmt":"2026-05-08T21:02:14","slug":"five-new-holes-one-exploited-found-in-ivanti-endpoint-manager-mobile","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=16197","title":{"rendered":"Five new holes, one exploited, found in Ivanti Endpoint Manager Mobile"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>The five new vulnerabilities discovered in Ivanti\u2019s on-premises mobile endpoint management solution are a \u201cclassic example of the legacy trap\u201d that CSOs must avoid, says an expert.<\/p>\n<p>\u201cPatch today to survive the weekend,\u201d said <a href=\"https:\/\/www.linkedin.com\/in\/rob-enderle-03729\/\" target=\"_blank\" rel=\"noreferrer noopener\">Robert Enderle<\/a> of the Enderle Group, \u201cbut start planning your exit from legacy MDM as soon as possible.\u201d<\/p>\n<p>He was commenting on <a href=\"https:\/\/hub.ivanti.com\/s\/article\/May-2026-Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-Multiple-CVEs?language=en_US\" target=\"_blank\" rel=\"noreferrer noopener\">an advisory issued Thursday<\/a> by Ivanti about the discovery of five holes in its Endpoint Manager Mobile (EPMM) suite. Updates for all are available.<\/p>\n<p>The flaws are serious enough that the US Cybersecurity and Infrastructure Security Agency (CISA) <a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2026\/04\/08\/cisa-adds-one-known-exploited-vulnerability-catalog\" target=\"_blank\" rel=\"noreferrer noopener\">added one of the vulnerabilities<\/a> to its Known Exploited Vulnerabilities Catalog because it\u2019s being actively exploited.<\/p>\n<p>\u201cThis isn\u2019t an isolated incident,\u201d Enderle added. \u201cIt\u2019s a <a href=\"https:\/\/hub.ivanti.com\/s\/article\/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US\" target=\"_blank\" rel=\"noreferrer noopener\">continuation<\/a> of the cycle <a href=\"https:\/\/www.csoonline.com\/article\/4125196\/ivanti-patches-two-actively-exploited-critical-vulnerabilities-in-epmm.html\" target=\"_blank\">we saw in January<\/a>, suggesting an underlying architecture struggling to withstand modern threats.\u201d<\/p>\n<p>A \u201cvery limited number of customers\u201d have been exploited through one of the vulnerabilities revealed this week, CVE-2026-6973. An improper input validation in EPMM\u00a0before\u00a0versions 12.6.1.1, 12.7.0.1, and 12.8.0.1\u00a0allows\u00a0a remotely authenticated user with\u00a0administrative access to perform remote code execution.<\/p>\n<p><a href=\"https:\/\/www.sans.org\/profiles\/dr-johannes-ullrich\" target=\"_blank\" rel=\"noreferrer noopener\">Johannes Ullrich<\/a>, dean of research at the SANS Institute, told us that Ivanti is right to point out that exploitation of this hole does require administrative access, and that attackers may have obtained the necessary credentials through exploits of prior vulnerabilities. Rotating credentials is critical after patching an already exploited vulnerability, he said. \u201cEven if no obvious signs of compromise are noted, it is hard to impossible to exclude a compromise. Best to rotate credentials even if no indicator of compromise was found.\u201d<\/p>\n<p>Ullrich also pointed out that<a href=\"https:\/\/www.ivanti.com\/blog\/may-2026-epmm-security-update\" target=\"_blank\" rel=\"noreferrer noopener\"> in a blog post accompanying the advisory<\/a>, Ivanti stated that it is using AI tools to proactively identify new vulnerabilities. \u201cThis may result in more vulnerability reports in the future,\u201d he said. \u201cI applaud Ivanti\u2019s openness and willingness to publicly enumerate the vulnerabilities as they are being fixed. It is important for organizations using the Ivanti product (or any product) to understand the risks of not patching or of delaying the patch.\u201d<\/p>\n<p>The four other flaws are:<\/p>\n<ul class=\"wp-block-list\">\n<li>CVE-2026-5787, with a CVSS score of 8.9, an improper certificate validation that allows a remote and unauthenticated attacker to impersonate registered Ivanti Sentry security gateway hosts and obtain valid CA-signed client certificates;<\/li>\n<li>CVE-2026-5786, with a CVSS score of 8.8, an improper access control vulnerability that allows a remote authenticated attacker to gain administrative access;<\/li>\n<li>CVE-2026-5788, an improper input validation hole that allows a remotely authenticated user with admin privileges to execute code remotely.<br \/>Ullrich said he is \u201csurprised that Ivanti assigned such a low CVSS score, 7.0, to this vulnerability. The description sounds more severe, but there are insufficient details to determine how Ivanti evaluated this vulnerability\u201d;<\/li>\n<li>CVE-2026-7821, an improper certificate validation vulnerability that allows a remote unauthenticated attacker to enroll a device belonging to a restricted set of unenrolled devices, leading to the disclosure of information about the affected EPMM appliance.\u00a0<\/li>\n<\/ul>\n<p>Sentry doesn\u2019t contain any of these vulnerabilities. However Ivanti admins should be aware that if they add a new Sentry server after EPMM has been updated,\u00a0they will need to use\u00a0one of the new Sentry versions\u00a0(10.4.2, 10.5.1 or\u00a010.6.1).\u00a0\u00a0<\/p>\n<p>To respond to the five new vulnerabilities in EPMM, Enderle said that CSOs must update to the resolved versions 12.6.1.1+ immediately, and rotate all administrative credentials. That\u2019s because attackers who executed previous exploits may already hold the keys to bypass these fixes.<\/p>\n<p>\u201cBeyond the immediate patch,\u201d he added, \u201cverify that Apple Device Enrolment is disabled if not in use, and begin a strategic evaluation of whether these aging on-premises appliances still fit a Zero Trust model.\u201d<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The five new vulnerabilities discovered in Ivanti\u2019s on-premises mobile endpoint management solution are a \u201cclassic example of the legacy trap\u201d that CSOs must avoid, says an expert. \u201cPatch today to survive the weekend,\u201d said Robert Enderle of the Enderle Group, \u201cbut start planning your exit from legacy MDM as soon as possible.\u201d He was commenting on an advisory issued Thursday by Ivanti about the discovery&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=16197\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-16197","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/16197","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=16197"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/16197\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=16197"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=16197"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=16197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}