Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

CISA Urges Immediate Action: High-Severity Vulnerability in Ivanti Endpoint Manager Mobile Exploited in Zero-Day Attacks


A critical vulnerability in Ivanti Endpoint Manager Mobile (EPMM) has been exploited in zero-day attacks, prompting CISA to urge federal agencies to take immediate action to patch their systems. The vulnerability allows attackers to execute arbitrary code remotely on systems running EPMM 12.8.0.0 and earlier.

  • Federal agencies must patch Ivanti Endpoint Manager Mobile (EPMM) by midnight Sunday, May 10, to address a high-priority security vulnerability.
  • The vulnerability, CVE-2026-6973, allows attackers with administrative privileges to execute arbitrary code remotely on systems running EPMM 12.8.0.0 and earlier.
  • Over 800 Ivanti EPMM appliances have been exposed online, making them potential targets for attackers.
  • A new zero-day exploit has been discovered that chains four previously disclosed exploits into one, bypassing both renderer and OS sandboxes.



  • The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority security advisory, urging federal agencies to take immediate action to patch a severe vulnerability in Ivanti Endpoint Manager Mobile (EPMM) that has been exploited in zero-day attacks. The vulnerability, tracked as CVE-2026-6973, allows attackers with administrative privileges to execute arbitrary code remotely on systems running EPMM 12.8.0.0 and earlier.

    In a recent security advisory, Ivanti warned customers of the high-severity vulnerability and advised them to secure their appliances by installing Ivanti EPMM 12.6.1.1, 12.7.0.1, and 12.8.0.1. The company also emphasized the importance of reviewing accounts with Admin rights and rotating those credentials where necessary.

    CISA has mandated that federal agencies patch their EPMM systems by midnight Sunday, May 10. This is not the first time Ivanti has faced a critical security vulnerability in its EPMM product; in late January, the company patched two other critical EPMM security issues (CVE-2026-1281 and CVE-2026-1340) that were exploited in zero-day attacks affecting a "very limited number of customers." On April 8, CISA also gave U.S. government agencies four days to secure their systems against attacks targeting the CVE-2026-1340 flaw.

    The Ivanti EPMM vulnerability is considered a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise. According to Shadowserver, a nonprofit security organization that tracks vulnerabilities, over 800 Ivanti EPMM appliances have been exposed online, providing potential targets for attackers.

    AI researchers have also discovered a new zero-day exploit that chains four previously disclosed exploits into one, bypassing both renderer and OS sandboxes. The exploit highlights the growing threat landscape of sophisticated cyber attacks.

    The vulnerability in Ivanti EPMM is just one example of the many security flaws being exploited by malicious actors. It underscores the importance of regular software updates, patch management, and proactive cybersecurity measures to protect against such threats.

    In conclusion, the high-severity vulnerability in Ivanti Endpoint Manager Mobile has highlighted the need for federal agencies to take immediate action to secure their systems. The mandatory deadline for patching EPMM systems by May 10 serves as a reminder of the importance of staying vigilant in the face of emerging cybersecurity threats.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/CISA-Urges-Immediate-Action-High-Severity-Vulnerability-in-Ivanti-Endpoint-Manager-Mobile-Exploited-in-Zero-Day-Attacks-ehn.shtml

  • https://www.bleepingcomputer.com/news/security/cisa-gives-feds-four-days-to-patch-ivanti-flaw-exploited-as-zero-day/

  • https://nvd.nist.gov/vuln/detail/CVE-2026-6973

  • https://www.cvedetails.com/cve/CVE-2026-6973/

  • https://nvd.nist.gov/vuln/detail/CVE-2026-1281

  • https://www.cvedetails.com/cve/CVE-2026-1281/

  • https://nvd.nist.gov/vuln/detail/CVE-2026-1340

  • https://www.cvedetails.com/cve/CVE-2026-1340/


  • Published: Fri May 8 08:00:16 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us