Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsAttackers Exploit Ivanti EPMM Zero-Days to Seize Control of MDM Servers
Attackers Exploit Ivanti EPMM Zero-Days to Seize Control of MDM Servers
GovTechDefenseCIO PulseCybersecurityEnterprise

Attackers Exploit Ivanti EPMM Zero-Days to Seize Control of MDM Servers

•February 23, 2026
0
CSO Online – Security
CSO Online – Security•Feb 23, 2026

Companies Mentioned

Ivanti

Ivanti

AVCT

Palo Alto Networks

Palo Alto Networks

PANW

Why It Matters

The vulnerabilities jeopardize the confidentiality and integrity of entire mobile fleets, forcing enterprises to reassess MDM security and patch‑management practices.

Key Takeaways

  • •Over 4,400 EPMM servers exposed publicly
  • •CVSS 9.8 scores for both vulnerabilities
  • •Unauthenticated attackers gain full MDM control
  • •Threat actors install persistent backdoors, cryptominers
  • •Patch must be reapplied after product upgrades

Pulse Analysis

Mobile Device Management platforms have become high‑value targets because they sit at the nexus of corporate data, user devices, and network access. The sheer number of publicly reachable Ivanti EPMM appliances—over 4,400 identified—creates a broad attack surface that rivals traditional web‑application exposures. When attackers compromise an MDM server, they inherit the ability to push policies, retrieve credentials, and manipulate every enrolled smartphone or tablet, effectively turning the organization’s own security tool into a conduit for espionage or ransomware.

The two zero‑days stem from unsafe Bash script handling in legacy Apache configurations, a flaw that enables arbitrary command execution without any user interaction. Unit 42 observed threat actors moving from automated scans to rapid deployment of second‑stage payloads, often installing web shells, cryptominers, or the open‑source Nezha monitoring agent to maintain persistence. The exploits have already been weaponized in sectors ranging from government to healthcare across the United States, Europe, and Australia, and proof‑of‑concept code is publicly available, raising the likelihood of broader, opportunistic attacks.

For defenders, the incident underscores the urgency of rigorous patch‑validation and continuous verification. Ivanti’s emergency patches mitigate the immediate risk but require re‑application after any version upgrade, highlighting the need for automated patch‑management pipelines and immutable backup strategies. Organizations should also adopt zero‑trust controls around MDM communications, monitor for anomalous device‑policy changes, and isolate compromised appliances for forensic analysis. As supply‑chain threats persist, a proactive stance—combining timely updates, network segmentation, and threat‑intel integration—will be essential to safeguard mobile ecosystems against future zero‑day campaigns.

Attackers exploit Ivanti EPMM zero-days to seize control of MDM servers

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...