Skip to content
Threat Feed
medium advisory

Ivanti Addresses Multiple Vulnerabilities in Various Products

Ivanti released security advisories on May 12, 2026, to address vulnerabilities in Xtraction, Endpoint Manager (EPM), Virtual Traffic Manager (vTM), and Secure Access Client (Windows), urging users to apply necessary updates to mitigate potential risks from CVE-2026-8043, CVE-2026-8051, CVE-2026-7431, and CVE-2026-7432.

On May 12, 2026, Ivanti published security advisories addressing multiple vulnerabilities across several of their products. The advisories cover Ivanti Xtraction (version 2026.1 and prior), Ivanti Endpoint Manager (EPM) (version 2024 SU5 and prior), Ivanti Virtual Traffic Manager (vTM) (version 22.9r3 and prior), and Ivanti Secure Access Client (Windows) (version 22.8R5 and prior). These vulnerabilities could potentially be exploited by attackers to gain unauthorized access, execute arbitrary code, or cause denial-of-service conditions. It is crucial for organizations using these products to review the specific advisories and apply the recommended updates to protect against these risks. The broad range of affected products emphasizes the need for a comprehensive patching strategy across the Ivanti ecosystem.

Attack Chain

  1. The attack begins with an unauthenticated attacker identifying a vulnerable Ivanti product within the target environment, potentially through scanning or reconnaissance.
  2. The attacker crafts a malicious request targeting a specific endpoint of the vulnerable product, exploiting a vulnerability such as command injection or authentication bypass (CVE-2026-8043, CVE-2026-8051, CVE-2026-7431, CVE-2026-7432).
  3. The vulnerable Ivanti application processes the malicious request without proper sanitization or validation.
  4. Due to the lack of input validation, the attacker injects arbitrary commands or code into the application’s execution flow.
  5. The injected code executes with the privileges of the Ivanti application, potentially allowing the attacker to read sensitive data, modify system configurations, or install malicious software.
  6. The attacker establishes a foothold on the compromised system and attempts to escalate privileges to gain greater control.
  7. With elevated privileges, the attacker moves laterally within the network, compromising additional systems and resources.
  8. The attacker achieves their final objective, such as data exfiltration, ransomware deployment, or disruption of critical services.

Impact

Successful exploitation of these vulnerabilities could allow attackers to gain unauthorized access to sensitive data, execute arbitrary code, or cause denial-of-service conditions. Depending on the specific vulnerability and the compromised system, the impact could range from minor data breaches to significant disruptions of critical business operations. Organizations using the affected Ivanti products are at risk, and the potential consequences could include financial losses, reputational damage, and regulatory fines. The lack of specific exploitation details in the advisory makes quantifying the potential damage difficult, but the wide deployment of these products suggests a potentially broad impact.

Recommendation

  • Immediately patch Ivanti Xtraction to a version greater than 2026.1, referencing the Ivanti Security Advisory for CVE-2026-8043.
  • Update Ivanti Endpoint Manager (EPM) beyond version 2024 SU5, as detailed in the Ivanti Security Advisory for Ivanti Endpoint Manager (EPM) May 2026.
  • Upgrade Ivanti Virtual Traffic Manager (vTM) past version 22.9r3, according to the May 2026 Security Advisory Ivanti Virtual Traffic Manager (vTM) addressing CVE-2026-8051.
  • Ensure Ivanti Secure Access Client (Windows) is updated beyond version 22.8R5 to mitigate CVE-2026-7431 and CVE-2026-7432, as per the May 2026 Security Advisory Ivanti Secure Access Client.
  • Deploy network monitoring rules to detect suspicious traffic to and from Ivanti products, specifically looking for patterns indicative of exploitation attempts targeting CVE-2026-8043, CVE-2026-8051, CVE-2026-7431, and CVE-2026-7432.
  • Enable logging on Ivanti products to capture relevant events for security analysis, focusing on authentication attempts, configuration changes, and process executions.

Detection coverage 2

Detect CVE-2026-8051 Exploitation Attempt - Suspicious URI Access

high

Detects CVE-2026-8051 exploitation attempt on Ivanti Virtual Traffic Manager (vTM) by monitoring for suspicious URI access patterns.

sigma tactics: initial_access techniques: T1190 sources: webserver

Detect CVE-2026-7431/7432 Exploitation Attempt - Ivanti Secure Access Client Suspicious Process

medium

Detects possible exploitation of CVE-2026-7431 or CVE-2026-7432 in Ivanti Secure Access Client (Windows) by monitoring process creation events.

sigma tactics: execution techniques: T1059.001 sources: process_creation, windows

Detection queries are available on the platform. Get full rules →