<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Virtual Traffic Manager (VTM) (&lt;= 22.9r3) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/virtual-traffic-manager-vtm--22.9r3/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 12 May 2026 15:28:49 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/virtual-traffic-manager-vtm--22.9r3/feed.xml" rel="self" type="application/rss+xml"/><item><title>Ivanti Addresses Multiple Vulnerabilities in Various Products</title><link>https://feed.craftedsignal.io/briefs/2026-05-ivanti-multiple-vulns/</link><pubDate>Tue, 12 May 2026 15:28:49 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-ivanti-multiple-vulns/</guid><description>Ivanti released security advisories on May 12, 2026, to address vulnerabilities in Xtraction, Endpoint Manager (EPM), Virtual Traffic Manager (vTM), and Secure Access Client (Windows), urging users to apply necessary updates to mitigate potential risks from CVE-2026-8043, CVE-2026-8051, CVE-2026-7431, and CVE-2026-7432.</description><content:encoded><![CDATA[<p>On May 12, 2026, Ivanti published security advisories addressing multiple vulnerabilities across several of their products. The advisories cover Ivanti Xtraction (version 2026.1 and prior), Ivanti Endpoint Manager (EPM) (version 2024 SU5 and prior), Ivanti Virtual Traffic Manager (vTM) (version 22.9r3 and prior), and Ivanti Secure Access Client (Windows) (version 22.8R5 and prior). These vulnerabilities could potentially be exploited by attackers to gain unauthorized access, execute arbitrary code, or cause denial-of-service conditions. It is crucial for organizations using these products to review the specific advisories and apply the recommended updates to protect against these risks. The broad range of affected products emphasizes the need for a comprehensive patching strategy across the Ivanti ecosystem.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attack begins with an unauthenticated attacker identifying a vulnerable Ivanti product within the target environment, potentially through scanning or reconnaissance.</li>
<li>The attacker crafts a malicious request targeting a specific endpoint of the vulnerable product, exploiting a vulnerability such as command injection or authentication bypass (CVE-2026-8043, CVE-2026-8051, CVE-2026-7431, CVE-2026-7432).</li>
<li>The vulnerable Ivanti application processes the malicious request without proper sanitization or validation.</li>
<li>Due to the lack of input validation, the attacker injects arbitrary commands or code into the application&rsquo;s execution flow.</li>
<li>The injected code executes with the privileges of the Ivanti application, potentially allowing the attacker to read sensitive data, modify system configurations, or install malicious software.</li>
<li>The attacker establishes a foothold on the compromised system and attempts to escalate privileges to gain greater control.</li>
<li>With elevated privileges, the attacker moves laterally within the network, compromising additional systems and resources.</li>
<li>The attacker achieves their final objective, such as data exfiltration, ransomware deployment, or disruption of critical services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could allow attackers to gain unauthorized access to sensitive data, execute arbitrary code, or cause denial-of-service conditions. Depending on the specific vulnerability and the compromised system, the impact could range from minor data breaches to significant disruptions of critical business operations. Organizations using the affected Ivanti products are at risk, and the potential consequences could include financial losses, reputational damage, and regulatory fines. The lack of specific exploitation details in the advisory makes quantifying the potential damage difficult, but the wide deployment of these products suggests a potentially broad impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch Ivanti Xtraction to a version greater than 2026.1, referencing the Ivanti Security Advisory for CVE-2026-8043.</li>
<li>Update Ivanti Endpoint Manager (EPM) beyond version 2024 SU5, as detailed in the Ivanti Security Advisory for Ivanti Endpoint Manager (EPM) May 2026.</li>
<li>Upgrade Ivanti Virtual Traffic Manager (vTM) past version 22.9r3, according to the May 2026 Security Advisory Ivanti Virtual Traffic Manager (vTM) addressing CVE-2026-8051.</li>
<li>Ensure Ivanti Secure Access Client (Windows) is updated beyond version 22.8R5 to mitigate CVE-2026-7431 and CVE-2026-7432, as per the May 2026 Security Advisory Ivanti Secure Access Client.</li>
<li>Deploy network monitoring rules to detect suspicious traffic to and from Ivanti products, specifically looking for patterns indicative of exploitation attempts targeting CVE-2026-8043, CVE-2026-8051, CVE-2026-7431, and CVE-2026-7432.</li>
<li>Enable logging on Ivanti products to capture relevant events for security analysis, focusing on authentication attempts, configuration changes, and process executions.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>ivanti</category><category>vulnerability</category><category>patch</category><category>cve</category></item></channel></rss>