Cybersecurity analysts monitoring network threats in government operations center
HighVulnerabilities

CISA adds Ivanti EPM flaw to exploited vulnerabilities list

CISA ordered federal agencies to patch a high-severity Ivanti Endpoint Manager vulnerability within three weeks after confirming active exploitation.

Emanuel DE ALMEIDA 10 Mar 2026, 12:36 2 min read 6 views 0 Comments

Last updated 11 Mar 2026, 00:44

Key Takeaways

CISA Flags Active Ivanti EPM Exploitation

The Cybersecurity and Infrastructure Security Agency added a high-severity Ivanti Endpoint Manager vulnerability to its Known Exploited Vulnerabilities catalog on March 10, 2026. The agency confirmed attackers are actively exploiting the flaw in the wild.

CISA issued a binding operational directive requiring all federal agencies to patch affected systems within 21 days. The vulnerability allows attackers to bypass authentication mechanisms in Ivanti's endpoint management platform.

Federal Agencies Face Mandatory Patching

All U.S. federal civilian executive branch agencies running Ivanti Endpoint Manager must comply with the patching deadline. The directive applies to any government systems using the affected EPM versions.

Private sector organizations using Ivanti EPM should also prioritize patching, though they're not bound by the federal mandate. The Hacker News reported that multiple vulnerabilities across different vendors were added to the catalog simultaneously.

Exploitation Confirmed in Government Systems

CISA's decision to add the vulnerability stems from evidence of active exploitation targeting government infrastructure. The agency's Known Exploited Vulnerabilities catalog only includes flaws with confirmed in-the-wild abuse.

Federal agencies must patch by March 31, 2026, or disconnect affected systems from their networks. Security Affairs noted this addition was part of a broader update that included vulnerabilities from SolarWinds and Omnissa Workspace One.

Frequently Asked Questions

What is the CISA KEV catalog deadline for Ivanti EPM?
Federal agencies must patch Ivanti Endpoint Manager systems by March 31, 2026, or disconnect them from networks.
Is the Ivanti EPM vulnerability being actively exploited?
Yes, CISA confirmed attackers are actively exploiting this high-severity authentication bypass flaw in the wild.
Who must comply with the Ivanti EPM patching directive?
All U.S. federal civilian executive branch agencies running Ivanti Endpoint Manager must patch within 21 days.

About the Author

Emanuel DE ALMEIDA

Emanuel DE ALMEIDA

Senior IT Journalist & Cloud Architect

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

You must be logged in to comment.

Loading comments...