CVE-2026-1603
Published: 10 February 2026
Description
An authentication bypass in Ivanti Endpoint Manager before version 2024 SU5 allows a remote unauthenticated attacker to leak specific stored credential data.
Mitigating Controls (NIST 800-53 r5)AI
Requires timely identification, reporting, and correction of flaws, directly mitigating the authentication bypass by applying the vendor patch to Ivanti Endpoint Manager 2024 SU5 or later.
Defines and authorizes only specific actions without identification or authentication, preventing exposure of critical credential data via alternate unauthenticated paths as in CWE-288 and CWE-306.
Enforces approved authorizations for logical access, directly countering the authentication bypass that allowed unauthorized leakage of stored credentials.
Security SummaryAI
CVE-2026-1603 is an authentication bypass vulnerability affecting Ivanti Endpoint Manager versions prior to 2024 SU5. It enables a remote unauthenticated attacker to leak specific stored credential data, stemming from issues classified under CWE-288 (Authentication Bypass Using an Alternate Path or Channel) and CWE-306 (Missing Authentication for Critical Function). The vulnerability carries a CVSS v3.1 base score of 8.6 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N), indicating high severity due to network accessibility, low attack complexity, no required privileges, and significant confidentiality impact across a changed scope.
A remote unauthenticated attacker can exploit this vulnerability over the network without user interaction by targeting the affected Endpoint Manager instance. Successful exploitation allows the attacker to access and leak specific stored credential data, potentially enabling further compromise such as lateral movement or privilege escalation within the environment, though it does not directly provide integrity or availability impacts.
Ivanti has published Security Advisory EPM-February-2026 detailing patches for Endpoint Manager 2024, recommending upgrade to version 2024 SU5 or later to mitigate the issue. The vulnerability is also listed in CISA's Known Exploited Vulnerabilities Catalog, urging federal agencies to apply mitigations immediately due to active exploitation.
This CVE has seen real-world exploitation, as evidenced by its inclusion in the CISA KEV catalog shortly after publication on 2026-02-10.
Details
- CWE(s)
- KEV Date Added
- 09 March 2026
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE-2026-1603 is a remote unauthenticated authentication bypass in a public-facing application (Ivanti Endpoint Manager) that directly enables exploitation for initial access (T1190) and leaks stored credentials via exploitation (T1212).