top of page

CVE-2026-1604: Remote Unauthenticated Attacker Can Steal Ivanti EPM Secrets (Updated)

  • Feb 12
  • 2 min read

Key Findings


  • Ivanti released security patches for its Endpoint Manager (EPM) product, addressing two critical vulnerabilities.

  • The most severe flaw, CVE-2026-1603, is a high-severity authentication bypass (CVSS 8.6) that allows remote unauthenticated attackers to access stored credentials.

  • The second vulnerability, CVE-2026-1602, is a medium-severity SQL injection flaw (CVSS 6.5) that could enable data theft by authenticated attackers.

  • There is no evidence of these vulnerabilities being actively exploited, but the risks are significant - successful attacks could lead to data compromise and further system intrusion.

  • Ivanti strongly urges administrators to upgrade to EPM version 2024 SU5 immediately to mitigate these security gaps.


Background


Ivanti Endpoint Manager (EPM) is a comprehensive endpoint management solution that helps organizations centrally manage and secure their devices and users. It provides features such as patch management, software deployment, and remote access control.


CVE-2026-1603: Authentication Bypass


The more critical of the two vulnerabilities is CVE-2026-1603, a high-severity authentication bypass flaw with a CVSS score of 8.6. This vulnerability allows a remote unauthenticated attacker to bypass security checks and access stored credential data within the EPM system.


The advisory states: "An authentication bypass in Ivanti Endpoint Manager before version 2024 SU5 allows a remote unauthenticated attacker to leak specific stored credential data."


By exploiting this flaw, an attacker can directly access sensitive information without needing to steal a valid user's credentials first. This poses a significant risk, as the harvested credentials could then be used to further compromise the targeted environment.


CVE-2026-1602: SQL Injection


The second vulnerability, CVE-2026-1602, is a medium-severity SQL injection flaw with a CVSS score of 6.5. While less critical than the authentication bypass, it still represents a serious data privacy risk.


The advisory describes the issue as: "SQL injection in Ivanti Endpoint Manager before version 2024 SU5 allows a remote authenticated attacker to read arbitrary data from the database."


An attacker who has already obtained some level of access to the EPM system can leverage this SQL injection vulnerability to directly query the database and extract sensitive information.


Mitigation


Ivanti has confirmed that these vulnerabilities are not being actively exploited at the time of disclosure. However, the risks posed by these flaws are significant, and administrators are strongly urged to apply the available patches immediately.


The affected versions of Ivanti Endpoint Manager are 2024 SU4 SR1 and prior. Administrators should upgrade to version 2024 SU5 or later to address these security issues and prevent potential data theft or further system compromise.


Sources


  • https://securityonline.info/cve-2026-1603-remote-unauthenticated-attacker-can-steal-ivanti-epm-secrets/

  • https://securityonline.info/crash-loop-palo-alto-networks-flaw-cve-2026-0229-forces-maintenance-mode/

  • https://x.com/the_yellow_fall/status/2021803519557407042

Recent Posts

See All
Defeating AI with AI

Key Findings Generative AI and agentic AI are increasingly used by threat actors to conduct faster and more targeted attacks. One capability that AI improves for threat actors is the ability to profil

 
 
 

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page