Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Hackers Target Ivanti EPMM with Critical Zero-Day Flaws
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Technology

Hackers Target Ivanti EPMM with Critical Zero-Day Flaws

Highlights

  • Hackers exploited two new zero-days in Ivanti EPMM network management software.

  • Security researchers observed swift global targeting following public vulnerability disclosure.

  • Temporary fixes are available, but broader vigilance remains crucial for organizations.

Ethan Moreno
Last updated: 4 February, 2026 - 12:30 am 12:30 am
Ethan Moreno 1 hour ago
Share
SHARE

Contents
How Do The Latest Vulnerabilities Work?What Steps Have Ivanti and Security Experts Taken?Are Broader Security Practices Being Questioned?

Security incidents involving enterprise network tools are drawing increasing scrutiny, with recent activity focusing on a pair of serious vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM). Administrators rely on Ivanti EPMM to manage devices and applications, making these incidents relevant to organizations concerned about securing remote access points. Cybersecurity teams are once again faced with a familiar pattern as attackers seek to leverage deficiencies in trusted network solutions, prompting calls for more aggressive vigilance.

Earlier news about Ivanti’s network device security showed recurring issues, with previous zero-days such as CVE-2025-4428 and multiple other EPMM vulnerabilities previously exploited by threat groups. Public advisories and catalog listings have gradually expanded, mirroring a steady cadence of vulnerabilities coming to light. Previous incidents spurred temporary fixes and prompted global monitoring, but complete long-term mitigation and thorough detection remain a persistent challenge for both Ivanti and its clients.

How Do The Latest Vulnerabilities Work?

The recently exposed flaws, CVE-2026-1281 and CVE-2026-1340, both rated 9.8 by CVSS, allow unauthenticated attackers to remotely execute code on affected Ivanti EPMM installations. According to Ivanti, the attack initially targeted a limited set of customers, but the range of exploitation has rapidly expanded following public disclosure. The Cybersecurity and Infrastructure Security Agency confirmed CVE-2026-1281 as a known exploited issue, reflecting the escalation and the pattern of swift mass exploitation after vulnerabilities become publicly known.

What Steps Have Ivanti and Security Experts Taken?

Ivanti quickly issued a temporary script for on-premises EPMM clients and promises a permanent solution in a forthcoming update. Despite the prompt response, researchers have urged organizations with internet-facing vulnerable instances to assume possible compromise and prioritize incident response. Monitoring organizations observed a notable increase in exploitation attempts, pointing out that more than 1,400 EPMM servers remain accessible online.

The software packages that address the defects “takes only seconds to apply, does not cause downtime and significantly increases adoption and protection rates for customers,”

Ivanti maintained. However, the company has not shared details about the total number of those affected.

Are Broader Security Practices Being Questioned?

Security specialists acknowledge that the intricate paths leading to these vulnerabilities complicate detection, with some highlighting the repeat nature of these incidents. According to analysts, the blurred distinction between trusted and untrusted code in EPMM extends the attack surface for opportunistic and targeted actors alike.

“Defensive engineering needs to assume attackers will find the non-obvious paths eventually, because they always do,”

one researcher said, emphasizing the need for proactive security measures rather than reactive fixes.

Several long-standing themes emerge from this episode: the attractiveness of network edge devices as targets, the recurring exploitation of Ivanti’s EPMM product, and the challenge of balancing rapid patch deployment with deeper code review. Security teams are advised to treat any online-exposed EPMM platform as compromised unless proven otherwise, and to review infrastructure for evidence of intrusion. While the company responded promptly this time, repeated incidents suggest that organizations need to bolster their own monitoring and be prepared to take quick action rather than solely relying on vendor patches.

Companies managing critical infrastructure should consider a layered defense approach and stay updated on vulnerability disclosures, especially for products like Ivanti EPMM known for a history of targeted attacks. Additionally, incident response readiness and rapid deployment of published mitigations may help reduce exposure between discovery and the release of permanent fixes. Organizations should align their risk management with recent advisories and take extra caution with internet-exposed management tools, as persistent targeting and advanced exploitation methods are likely to continue in this sector.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Waymo Secures $16 Billion, Scales Up Robotaxi Operations

Brands Compete as Google AI Overviews Reshape Search Ads

Nordic Region Powers AI Data Centers Sustainably

Bezos Earth Fund Strengthens Nuclear Push to Meet AI Energy Demands

Anduril Draws Global Talent With AI Drone Grand Prix Competition

Share This Article
Facebook Twitter Copy Link Print
Ethan Moreno
By Ethan Moreno
Ethan Moreno, a 35-year-old California resident, is a media graduate. Recognized for his extensive media knowledge and sharp editing skills, Ethan is a passionate professional dedicated to improving the accuracy and quality of news. Specializing in digital media, Moreno keeps abreast of technology, science and new media trends to shape content strategies.
Previous Article Tesla Engineers Continue Apple CarPlay Integration Efforts
Next Article Waymo Secures $16 Billion, Scales Up Robotaxi Operations

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Overland AI Secures $100M To Advance Autonomous Ground Vehicles
AI Robotics
Tesla Engineers Continue Apple CarPlay Integration Efforts
Electric Vehicle
Waymo Faces Probe and Fauna Launches Sprout in Busy Robotics Week
AI Robotics
Tesla Drops “Standard” Label from Model Y Lineup, Launches New AWD Variant
Electric Vehicle
Nvidia Hints at Handheld PC with New Chip Teasers
Computing
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?