For its Endpoint Manager (EPM) software, Ivanti has released a critical security patch in a hurry, addressing two serious flaws that could allow hackers to steal confidential information from business networks This article explores epm access endpoints. . The update, which was made available on February 9, 2026, fixes bugs in EPM 2024 versions, a program that IT teams use to keep an eye on and secure servers and laptops throughout businesses.

EPM has access to endpoints worldwide because it operates deep within networks. Because they provide an easy way to sneak in and quickly obtain credentials or other data, these bugs are therefore popular targets for hackers. The main weakness Bypassing Authentication CVE-2026-1603, a high-severity authentication bypass vulnerability with a CVSS score of 8.6, is the main attraction.

Imagine a hacker without a username or password sitting outside your firewall. They just send the EPM server a carefully constructed request, and the stored credential data is immediately pulled out. EPM versions prior to 2024 SU5 are impacted.

Since there is no login required, script kiddies could remotely exploit it with little skill. Blocking unauthorized access is urgent; patching is not an option. Next up is CVE-2026-1602, a medium-severity SQL injection vulnerability with a CVSS score of 6.5. In this case, the attacker must first have legitimate login credentials, possibly obtained through phishing or a weak password.

Once inside, they modify database queries to output arbitrary data, such as configurations or user information. Although it requires initial access, it is less frightening than the bypass; however, insiders or compromised accounts may still be at risk.

Imagine it as a back door that is left open after the front door has been picked. Authentication Bypass CVE-2026-1602 CVE Number Severity CVSS Score Type CVE-2026-1603 High 8.6 SQL Injection Medium 6.5 This is a one-stop security cleanup because Ivanti also included fixes for 11 medium bugs from October 2025. The good news is that there haven't been any reported wild exploits yet.

For responsible disclosure, credit is given to researcher "06fe5fd2bc53027c4a3b7e395af0b850e7b8a044" through the Trend Zero Day Initiative. Act quickly, organizations on Ivanti EPM 2024 SU4 SR1 or older: Verify your version by logging into the admin console. Get 2024 SU5 from the Ivanti License System (ILS) to patch right away. Look for clues: Look for odd logins or data requests.

Layer defenses: Keep an eye on endpoints and activate multi-factor authentication.

Ivanti emphasizes rapid updates to prevent data leaks. Delaying puts you at risk of breach headlines in a world where ransomware is on the rise.