Exploited Flaws in Ivanti EPM and Cisco SD-WAN Raise Alarms
Basically, hackers are using serious security holes in Ivanti and Cisco software to break in and steal data.
CISA has issued a warning about exploited flaws in Ivanti and Cisco software. Organizations using these systems are at risk of data breaches. Immediate action is required to patch vulnerabilities and protect sensitive information.
What Happened
A serious alert has been issued by the US Cybersecurity and Infrastructure Security Agency (CISA). An authentication bypass vulnerability in Ivanti Endpoint Manager (EPM) is being actively exploited by attackers. This vulnerability, tracked as CVE-2026-1603?, affects versions of EPM prior to 2024 SU5 and allows unauthorized users to leak sensitive credential data.
This warning comes just after Ivanti patched the vulnerability on February 9. At that time, they believed no customers were affected. However, CISA has now added this flaw to its Known Exploited Vulnerabilities (KEV)? catalog, indicating that the situation has changed. Alongside this, CISA has also updated its directive regarding two critical flaws in Cisco’s SD-WAN software, which were exploited in zero-day attacks?.
Why Should You Care
This isn't just a technical issue; it affects you directly. If your organization uses Ivanti EPM or Cisco SD-WAN, you could be at risk of data breaches. Imagine leaving your front door unlocked, thinking no one would notice. That's what using vulnerable software feels like right now. Hackers can sneak in and access sensitive information, potentially leading to identity theft or financial loss.
The key takeaway is that these vulnerabilities are not just theoretical; they are being actively exploited. If you or your company are using these systems, you need to act quickly to protect your data and your reputation.
What's Being Done
CISA is taking action by urging federal agencies? to identify affected systems and patch these vulnerabilities immediately. They have also updated their emergency directive, which now requires agencies to report collected logs from their SD-WAN deployments by March 26. Here’s what you should do right now:
- Identify if your systems are using Ivanti EPM or Cisco SD-WAN.
- Apply the latest patches released by Ivanti and Cisco.
- Monitor your systems for any signs of compromise.
Experts are closely watching how these vulnerabilities evolve and whether more attacks will follow. Stay vigilant and keep your systems updated to minimize risks.
CSO Online