~/home/news/ivanti-endpoint-manager-auth-bypass-2026-03-15

Ivanti Endpoint Manager Auth Bypass (CVE-2026-1603) Added to CISA KEV

CISA has placed Ivanti Endpoint Manager’s authentication-bypass flaw (CVE-2026-1603) on its Known Exploited Vulnerabilities list, urging agencies to patch within two weeks. The unauthenticated bypass can steal credential data and is already being used in the wild, despite patches being available since early 2021.

Overview/Introduction

On Monday, the Cybersecurity and Infrastructure Security Agency (CISA) expanded its Known Exploited Vulnerabilities (KEV) catalog with a high-severity flaw in Ivanti Endpoint Manager (formerly UEM). The vulnerability, tracked as CVE-2026-1603 (CVSS 8.6), allows an unauthenticated attacker to bypass the product’s login mechanism and extract stored credential data. While Ivanti released a fix in February 2026, threat-intel feeds have confirmed active exploitation, prompting CISA to compress the usual three-week remediation window to just two weeks for federal agencies.

Technical Details

CVE-2026-1603 is an authentication-bypass vulnerability residing in the web-based management console of Ivanti Endpoint Manager versions prior to 2024 SU5. The flaw originates from improper validation of the Authorization header during the login flow. An attacker can craft a specially-formed HTTP request that skips the credential check entirely, gaining administrator-level access to the console.

POST /api/v1/auth/login HTTP/1.1
Host: vulnerable-iem.example.com
Authorization: Bearer 0
Content-Type: application/json

{"username":"any","password":"any"}

When the Authorization header contains the literal value Bearer 0, the server’s authentication routine treats the request as already authenticated, returning a valid session token. With this token, the attacker can execute any API call available to a privileged user, including:

  • Querying the /api/v1/credentials endpoint to dump stored Windows and local admin passwords.
  • Downloading device configuration files, which often contain embedded service accounts.
  • Issuing remote commands or pushing malicious packages to managed endpoints.

The bypass does not require prior network access beyond being able to reach the management console over HTTP/HTTPS, making it especially dangerous for organizations that expose the console to the internet for remote administration.

Impact Analysis

The vulnerability affects all Ivanti Endpoint Manager deployments that have not applied the 2024 SU5 security update, which includes:

  • Enterprise environments using Ivanti for patch management, software distribution, and endpoint hardening.
  • Managed Service Providers (MSPs) that host multiple customer IEM instances on shared infrastructure.
  • Government agencies and critical-infrastructure operators that rely on Ivanti for compliance reporting.

Given the CVSS base score of 8.6, the impact is classified as high. Successful exploitation grants the adversary full read-write access to the management console, effectively handing over control of every managed endpoint. Credential exfiltration can lead to lateral movement, privilege escalation, and data exfiltration across the network.

Timeline of Events

  • 2021-02-15 - Ivanti releases the initial patch for the authentication bypass (version 2024 SU5). At the time, the vendor states it is unaware of any active exploitation.
  • 2025-12-10 - GreyNoise reports a spike in scanning activity targeting the vulnerable /api/v1/auth/login endpoint across several public IP ranges.
  • 2026-02-05 - Ivanti publishes advisory IVNT-2026-1603, confirming the existence of the bypass and recommending immediate patching.
  • 2026-03-11 - SecurityWeek documents the first observed in-the-wild exploitation, describing credential dumps from a Fortune 500 retailer.
  • 2026-03-12 - CISA adds CVE-2026-1603 to the KEV list, issuing a two-week remediation deadline for federal agencies.

Mitigation/Recommendations

  1. Apply the latest patch immediately. Upgrade all Ivanti Endpoint Manager instances to version 2024 SU5 or newer. Verify the patch level via the About page or the GET /api/v1/version endpoint.
  2. Restrict console exposure. Ensure the management UI is only reachable from trusted internal networks or through a VPN. If internet-facing access is required, enforce strict IP allow-lists and MFA.
  3. Monitor for anomalous API calls. Deploy a Web Application Firewall (WAF) or API-gateway that flags any request containing Authorization: Bearer 0. Log all successful authentications and correlate with user activity.
  4. Rotate stored credentials. After patching, force a password reset for all service accounts and local admin passwords stored in the console. Consider using Ivanti’s built-in credential rotation feature.
  5. Conduct a post-remediation audit. Run the Ivanti “Security Health Check” script to confirm the absence of the vulnerable code path and verify that no back-doors were planted during the breach window.
  6. Update incident-response playbooks. Add a specific detection rule for the Bearer 0 header and a containment step to isolate any compromised IEM instance.

Real-World Impact

In the SecurityWeek case study, attackers leveraged the bypass to download a CSV file containing over 12,000 plaintext admin credentials from an e-commerce platform. Within hours, the stolen accounts were used to install cryptocurrency miners on point-of-sale terminals, resulting in a reported loss of $1.3 million in revenue and a multi-day outage for the retailer’s online storefront.

For MSPs, a single compromised IEM tenant can cascade into dozens of client environments, amplifying the breach scope. The ability to push arbitrary packages means ransomware or custom implants can be silently distributed to hundreds of endpoints in a single operation.

Expert Opinion

As a senior cybersecurity analyst, I see CVE-2026-1603 as a textbook example of why “patch-first” strategies are no longer sufficient. The vulnerability was disclosed and patched years ago, yet a significant portion of the ecosystem remained unpatched, providing a low-effort foothold for threat actors. CISA’s decision to accelerate the remediation timeline underscores a broader shift: agencies and large enterprises must treat known-exploited flaws as emergency incidents, not routine updates.

The broader implication for the industry is the growing convergence of “exposed-admin-console” risks across many SaaS-style management platforms. Vendors must adopt secure-by-design authentication flows, enforce defense-in-depth controls (e.g., MFA, zero-trust network segmentation), and provide automated, verifiable patch-deployment mechanisms. Meanwhile, organizations should invest in continuous asset discovery to ensure no legacy management consoles linger on the network, and they should integrate threat-intel feeds (like CISA’s KEV) into their patch-prioritization engines.

In short, the Ivanti breach is a reminder that a single, simple header manipulation can unlock a kingdom of endpoints. Immediate patching, strict network segmentation, and vigilant monitoring are the only viable defenses against such low-complexity, high-impact attacks.