PT-2026-7270 · Ivanti · Ivanti Endpoint Manager
Published
2026-02-09
·
Updated
2026-03-10
·
CVE-2026-1603
CVSS v3.1
8.6
8.6
High
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N |
Name of the Vulnerable Software and Affected Versions
Ivanti Endpoint Manager versions prior to 2024 SU5
Description
An authentication bypass exists in Ivanti Endpoint Manager, allowing a remote, unauthenticated attacker to leak stored credential data. This issue is caused by improper authentication, specifically a malformed header concatenation in the
WSAuth.dll component that allows session token verification to be bypassed via null byte injection, granting access to internal APIs. Attackers can bypass authentication to access the /api/credentials/export endpoint and retrieve encrypted credential blobs for high-privilege accounts, potentially compromising the entire endpoint management trust model and enabling lateral movement. The vulnerability has been exploited in the wild and poses a significant risk of ransomware deployment. The root cause is CWE-287 (Improper Authentication).Recommendations
Upgrade to Ivanti Endpoint Manager 2024 SU5.
If patching is not immediately possible, block internet access to EPM management ports (80/443).
If patching is not immediately possible, implement strict IP allowlisting for administrative access only.
If patching is not immediately possible, disable the
/remote/tools/api/v1/ endpoint via IIS rewrite rules.
Monitor for requests to /api/credentials/export from unauthenticated IPs.
Monitor for X-CSRF-Token headers containing %00 or null bytes.
Watch for anomalous credential vault access outside of normal business hours.Fix
Missing Authentication
Authentication Bypass Using an Alternate Path or Channel
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
BDU:2026-01795
CVE-2026-1603
ZDI-26-080
Affected Products
Ivanti Endpoint Manager
References · 36
- https://zerodayinitiative.com/advisories/ZDI-26-080 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2026-1603 · Security Note
- https://bdu.fstec.ru/vul/2026-01795 · Security Note
- https://twitter.com/TheHackerWire/status/2021257184668156091 · Twitter Post
- https://reddit.com/r/TechNadu/comments/1rpxcby/solarwinds_and_ivanti_under_fire_again_cisa_flags · Reddit Post
- https://twitter.com/dailycve/status/2031121763929620984 · Twitter Post
- https://twitter.com/CveFindCom/status/2021270718235726037 · Twitter Post
- https://twitter.com/CCBalert/status/2021698016172703790 · Twitter Post
- https://twitter.com/ThreatSynop/status/2021265651768111291 · Twitter Post
- https://twitter.com/0dayPublishing/status/2031077353942577269 · Twitter Post
- https://twitter.com/OstorlabSec/status/2021653139904938346 · Twitter Post
- https://reddit.com/r/u_all-in-one-wisper/comments/1r3q188/daily_wisper_report_post_patch_roundup_feb_13 · Reddit Post
- https://cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-1603 · Note
- https://twitter.com/cyberkendra/status/2022395414528598306 · Twitter Post
- https://twitter.com/CISACyber/status/2031054314957897776 · Twitter Post