Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access

May 16, 2026

PCPJack Credential Stealer Exploits 5 CVEs to Spread Worm-Like Across Cloud Systems

May 16, 2026

What Fronter AI Models Like Mythos & GPT-Cyber Mean for Cybersecurity

May 15, 2026
Facebook X (Twitter) Instagram
Saturday, May 16
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access
News

Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access

Team-CWDBy Team-CWDMay 16, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Ivanti is warning that a new security flaw impacting Endpoint Manager Mobile (EPMM) has been explored in limited attacks in the wild.

The high-severity vulnerability, CVE-2026-6973 (CVSS score: 7.2), is a case of improper input validation affecting EPMM before versions 12.6.1.1, 12.7.0.1, and 12.8.0.1.

It allows “a remotely authenticated user with administrative access to achieve remote code execution,” Ivanti said in an advisory released today.

“We are aware of a very limited number of customers exploited with CVE-2026-6973. Successful exploitation requires Admin authentication. If customers followed Ivanti’s recommendation in January to rotate credentials if you were exploited with CVE-2026-1281 and CVE-2026-1340, then your risk of exploitation from CVE-2026-6973 is significantly reduced.”

It’s currently not known who is behind the exploitation efforts, if any of those attacks were successful, and what the end goals of the attacks were.

The development has prompted the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to add the flaw to its Known Exploited Vulnerabilities (KEV) catalog, requiring Federal Civilian Executive Branch (FCEB) agencies to apply the fixes by May 10, 2026.

Also patched by Ivanti in EPMM are four other flaws –

  • CVE-2026-5786 (CVSS score: 8.8) – An improper access control vulnerability that allows a remote authenticated attacker to gain administrative access.
  • CVE-2026-5787 (CVSS score: 8.9) – An improper certificate validation vulnerability that allows a remote unauthenticated attacker to impersonate registered Sentry hosts and obtain valid CA-signed client certificates.
  • CVE-2026-5788 (CVSS score: 7.0) – An improper access control vulnerability that allows a remote unauthenticated attacker to invoke arbitrary methods.
  • CVE-2026-7821 (CVSS score: 7.4) – An improper certificate validation vulnerability that allows a remote unauthenticated attacker to enroll a device belonging to a restricted set of unenrolled devices, leading to information disclosure about the EPMM appliance and impacting the integrity of the newly enrolled device identity.

“The issues only affect the on-prem EPMM product, and are not present in Ivanti Neurons for MDM, Ivanti’s cloud-based unified endpoint management solution, Ivanti EPM (a similarly named, but different product), Ivanti Sentry, or any other Ivanti products,” the company said.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticlePCPJack Credential Stealer Exploits 5 CVEs to Spread Worm-Like Across Cloud Systems
Team-CWD
  • Website

Related Posts

News

PCPJack Credential Stealer Exploits 5 CVEs to Spread Worm-Like Across Cloud Systems

May 16, 2026
News

Attackers Combine ClickFix With PySoxy to Maintain Persistence

May 15, 2026
News

PAN-OS RCE Exploit Under Active Use Enabling Root Access and Espionage

May 15, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views
Our Picks

Here’s what you should know

February 6, 2026

Look out for phony verification pages spreading malware

September 14, 2025

How it preys on personal data – and how to stay safe

October 23, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.