CVE-2026-1603

8.6 HIGH

📋 TL;DR

An authentication bypass vulnerability in Ivanti Endpoint Manager allows remote unauthenticated attackers to access stored credential data. This affects all Ivanti Endpoint Manager installations before version 2024 SU5. Attackers can potentially obtain sensitive authentication information without valid credentials.

💻 Affected Systems

Products:
  • Ivanti Endpoint Manager
Versions: All versions before 2024 SU5
Operating Systems: Windows Server, Linux (EPM supported distributions)
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain administrative credentials, gain full control of the endpoint management system, and potentially compromise all managed endpoints across the organization.

🟠

Likely Case

Attackers leak specific credential data that could be used for lateral movement, privilege escalation, or further attacks against the organization's infrastructure.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to credential exposure without immediate system compromise.

🌐 Internet-Facing: HIGH - Remote unauthenticated exploitation means internet-facing instances are immediately vulnerable to attack.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this, but requires network access to the EPM server.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Authentication bypass vulnerabilities typically have low exploitation complexity. Remote unauthenticated access makes this particularly dangerous.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024 SU5 or later

Vendor Advisory: https://hub.ivanti.com/s/article/Security-Advisory-EPM-February-2026-for-EPM-2024?language=en_US

Restart Required: Yes

Instructions:

1. Download Ivanti Endpoint Manager 2024 SU5 or later from the Ivanti portal. 2. Backup current configuration and database. 3. Run the installer with administrative privileges. 4. Restart the EPM services or server as prompted.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to the EPM server to only trusted administrative networks

Web Application Firewall Rules

all

Implement WAF rules to block suspicious authentication bypass attempts

🧯 If You Can't Patch

  • Isolate the EPM server from internet access and restrict internal access to only necessary administrative systems
  • Implement enhanced monitoring and alerting for authentication attempts and credential access patterns

🔍 How to Verify

Check if Vulnerable:

Check Ivanti Endpoint Manager version in the web interface under Help > About or via the EPM console

Check Version:

On EPM server: Check registry (Windows) or configuration files (Linux) for version information

Verify Fix Applied:

Verify version is 2024 SU5 or later and test authentication mechanisms are functioning properly

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts from unexpected IPs
  • Credential access logs showing unauthorized queries
  • Failed authentication followed by successful credential access

Network Indicators:

  • HTTP requests to EPM authentication endpoints without proper session tokens
  • Unusual traffic patterns to credential storage endpoints

SIEM Query:

source="epm_logs" AND (event_type="auth_bypass" OR (auth_result="failure" AND subsequent_event="credential_access"))

🔗 References

📤 Share & Export