{"id":45235,"date":"2026-04-09T01:04:25","date_gmt":"2026-04-08T17:04:25","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/09\/cisa-orders-feds-to-patch-exploited-ivanti-epmm-flaw-by-sunday\/"},"modified":"2026-04-09T01:04:25","modified_gmt":"2026-04-08T17:04:25","slug":"cisa-orders-feds-to-patch-exploited-ivanti-epmm-flaw-by-sunday","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/09\/cisa-orders-feds-to-patch-exploited-ivanti-epmm-flaw-by-sunday\/","title":{"rendered":"CISA orders feds to patch exploited Ivanti EPMM flaw by Sunday"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2025\/01\/13\/CISA--headpic.jpg\" width=\"1600\" alt=\"CISA orders feds to patch exploited Ivanti EPMM flaw by Sunday\"><\/p>\n<p>CISA has given&nbsp;U.S. government agencies four&nbsp;days to secure their systems against a critical-severity vulnerability in Ivanti Endpoint Manager Mobile (EPMM) that&nbsp;has been exploited in attacks since January.<\/p>\n<p>Tracked as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-1340\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2026-1340<\/a>, this critical-severity code injection flaw enables threat actors without privileges to gain remote code execution on Internet-exposed and unpatched EPMM appliances.<\/p>\n<p>Ivanti <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ivanti-warns-of-two-epmm-flaws-exploited-in-zero-day-attacks\/\" target=\"_blank\" rel=\"nofollow noopener\">flagged<\/a> this and a second security bug (CVE-2026-1281) as abused in zero-day attacks when it released security updates on January 29 to patch both vulnerabilities and &#8220;strongly&#8221; encouraged all customers to update their systems to block ongoing exploitation.<\/p>\n<div align=\"center\" style=\"width:98%; margin:0 auto; text-align:center; padding:4px; background:#f0f0f0; border:1px solid #ccc; border-radius:6px;\">  <a href=\"https:\/\/www.adaptivesecurity.com\/demo\/security-awareness-training?utm_source=display_network&amp;utm_medium=paid_display&amp;utm_campaign=2026_04_display_bleepingcomputer&amp;utm_id=701Rd00000fE8REIA0&amp;utm_content=970x250\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/a\/as-tour-the-platform-970-x250.jpg\" style=\"margin-top: 0px;\" alt=\"CISA orders feds to patch exploited Ivanti EPMM flaw by Sunday\"><\/a> <\/div>\n<p>&#8220;Successful exploitation could lead to unauthenticated remote code execution. We are aware of a very limited number of customers whose solution has been exploited at the time of disclosure,&#8221; the company said at the time.<\/p>\n<p>Internet security watchdog group Shadowserver is currently tracking <a href=\"https:\/\/bsky.app\/profile\/shadowserver.bsky.social\/post\/3majeq7gru22k\" target=\"_blank\" rel=\"nofollow noopener\">nearly 950 IP addresses with Ivanti EPMM fingerprints<\/a>&nbsp;still exposed online, most of them from Europe (569) and North America (206). However, there is no information on how many of them have already been patched.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"359\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1109292\/2026\/Ivanti%20EPMM%20appliances%20exposed%20online.png\" width=\"700\" alt=\"CISA orders feds to patch exploited Ivanti EPMM flaw by Sunday\"><figcaption><em>Ivanti EPMM appliances exposed online (Shadowserver)<\/em><\/figcaption><\/figure>\n<\/div>\n<p>&#8203;&#8203;On Monday, the U.S. Cybersecurity and Infrastructure Security Agency <a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2026\/04\/08\/cisa-adds-one-known-exploited-vulnerability-catalog\" target=\"_blank\" rel=\"nofollow noopener\">added<\/a> the vulnerability to its <a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-1340\" target=\"_blank\" rel=\"nofollow noopener\">Known Exploited Vulnerabilities (KEV) Catalog<\/a> and ordered Federal Civilian Executive Branch (FCEB) agencies to patch their EPMM systems by Saturday midnight, April 11, as mandated by <a href=\"https:\/\/www.cisa.gov\/binding-operational-directive-22-01\" target=\"_blank\" rel=\"nofollow noopener\">Binding Operational Directive (BOD) 22-01<\/a>.<\/p>\n<p>&#8220;This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise,&#8221; CISA warned. &#8220;Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.&#8221;<\/p>\n<p>CISA advised all defenders, including those in the private sector, to prioritize applying patches for CVE-2026-1340 to secure their organizations&#8217; devices as soon as possible, even though BOD 22-01 applies only to U.S. federal agencies.<\/p>\n<p>Multiple other Ivanti vulnerabilities have been exploited in <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ivanti-fixes-epmm-zero-days-chained-in-code-execution-attacks\/\" target=\"_blank\" rel=\"nofollow noopener\">recent years<\/a> via <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ivanti-patches-connect-secure-zero-day-exploited-since-mid-march\/\" target=\"_blank\" rel=\"nofollow noopener\">zero-day attacks<\/a> to <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ivanti-warns-of-three-more-csa-zero-days-exploited-in-attacks\/\" target=\"_blank\" rel=\"nofollow noopener\">breach<\/a> a <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ivanti-warns-of-new-connect-secure-zero-day-exploited-in-attacks\/\" target=\"_blank\" rel=\"nofollow noopener\">wide range<\/a> of <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-emergency-directive-mitigate-ivanti-zero-days-immediately\/\" target=\"_blank\" rel=\"nofollow noopener\">targets<\/a>, including <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ivanti-epmm-flaw-exploited-by-chinese-hackers-to-breach-govt-agencies\/\" target=\"_blank\" rel=\"nofollow noopener\">government<\/a> <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/norway-says-ivanti-zero-day-was-used-to-hack-govt-it-systems\/\" target=\"_blank\" rel=\"nofollow noopener\">agencies<\/a> worldwide.<\/p>\n<p>In total, CISA has <a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog?search_api_fulltext=ivanti&amp;field_date_added_wrapper=all&amp;field_cve=&amp;sort_by=field_date_added&amp;items_per_page=All&amp;url=\" target=\"_blank\" rel=\"nofollow noopener\">tagged 33 Ivanti vulnerabilities<\/a> as exploited in attacks, 12 of which have been used by various ransomware operations.<\/p>\n<p>Ivanti provides IT asset management products to over 40,000 customers through a network of more than 7,000 partners around the globe.<\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 200px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-orders-feds-to-patch-exploited-ivanti-epmm-flaw-by-sunday\/data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"https:\/\/www.bleepstatic.com\/c\/p\/picus-whitepaper.jpg\" alt=\"CISA orders feds to patch exploited Ivanti EPMM flaw by Sunday\"><\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Automated Pentesting Covers Only 1 of 6 Surfaces.<\/a><\/h2>\n<p>Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.<\/p>\n<p>This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.<\/p>\n<p>           <button><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Get Your Copy Now<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ivanti-epmm-flaw-exploited-by-chinese-hackers-to-breach-govt-agencies\/\">Ivanti EPMM flaw exploited by Chinese hackers to breach govt agencies<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ivanti-warns-of-two-epmm-flaws-exploited-in-zero-day-attacks\/\">Ivanti warns of two EPMM flaws exploited in zero-day attacks<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-orders-feds-to-patch-actively-exploited-citrix-flaw-by-thursday\/\">CISA orders feds to patch actively exploited Citrix flaw by Thursday<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-now-exploit-critical-f5-big-ip-flaw-in-attacks-patch-now\/\">Hackers exploiting critical F5 BIG-IP flaw in attacks, patch now<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-orders-feds-to-patch-darksword-ios-flaws-exploited-attacks\/\">CISA orders feds to patch DarkSword iOS flaws exploited attacks<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>CISA has given&nbsp;U.S. government agencies four&nbsp; [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-45235","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45235","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45235"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45235\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45235"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45235"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45235"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}