Saturday, February 14, 2026

One menace actor chargeable for 83% of current Ivanti RCE assaults


Menace intelligence observations present {that a} single menace actor is chargeable for a lot of the lively exploitation of two crucial vulnerabilities in Ivanti Endpoint Supervisor Cellular (EPMM), tracked as CVE-2026-21962 and CVE-2026-24061.

The safety points have been flagged as actively exploited in zero-day assaults in Ivanti’s safety advisory, the place the corporate additionally introduced hotfixes.

Each flaws acquired a crucial severity score and permit an attacker to inject code with out authentication, resulting in distant code execution (RCE) on weak methods.

Wiz

A single IP deal with hosted on bulletproof infrastructure is chargeable for over 83% of exploitation exercise associated to the 2 vulnerabilities, says threat-focused web intelligence firm GreyNoise.

Between February 1st and ninth, the monitoring platform noticed 417 exploitation classes originating from 8 distinctive supply IP addresses, and centered on CVE-2026-21962 and CVE-2026-24061.

The best quantity, 83%, comes from 193[.]24[.]123[.]42, hosted by PROSPERO OOO (AS200593), which Censys analysts marked as a bulletproof autonomous system used to focus on varied software program merchandise.

Attack sources
Assault supply IPs
Supply: GreyNoise

A pointy spike occurred on February 8, with 269 recorded classes in a single day. The determine is sort of 13 instances the every day common of twenty-two classes, GreyNoise famous.

Of the 417 exploitation classes, 354 (85%) used OAST-style DNS callbacks to confirm command execution functionality, pointing to preliminary entry dealer exercise.

Curiously, a number of printed indicators of compromise (IoCs) embrace IP addresses for Windscribe VPN (185[.]212[.]171[.]0/24) current in GreyNoise telemetry as scanning Oracle WebLogic cases, however no Ivanti exploitation exercise.

The researchers be aware that the PROSPERO OOO IP deal with they noticed “is just not on extensively printed IOC lists, that means defenders blocking solely printed indicators are probably lacking the dominant exploitation supply.”

This IP is just not restricted to Ivanti focusing on, because it concurrently exploited three extra vulnerabilities: CVE-2026-21962 in Oracle WebLogic, CVE-2026-24061 in GNU Inetutils Telnetd, and CVE-2025-24799 in GLPI.

The Oracle WebLogic flaw had the lion’s share in session volumes, dwarfing the remainder with 2,902 classes, adopted by the Telnetd problem with 497 classes.

Exploitation exercise seems absolutely automated, rotating between 300 consumer brokers.

Targeted vulnerabilities
Focused vulnerabilities
Supply: GreyNoise

Ivanti’s fixes for CVE-2026-1281 and CVE-2026-1340 aren’t everlasting. The corporate promised to launch full patches within the first quarter of this 12 months, with the discharge of EPMM model 12.8.0.0.

Till then, it’s endorsed to make use of RPM packages 12.x.0.x for EPMM variations 12.5.0.x, 12.6.0.x, and 12.7.0.x, and RPM 12.x.1.x for EPMM variations 12.5.1.0 and 12.6.1.0.

The seller notes that essentially the most conservative strategy is to construct a substitute EPMM occasion and migrate all knowledge there. Directions on how to try this are obtainable right here.

Fashionable IT infrastructure strikes sooner than handbook workflows can deal with.

On this new Tines information, find out how your crew can cut back hidden handbook delays, enhance reliability via automated response, and construct and scale clever workflows on high of instruments you already use.

Related Articles

Latest Articles