<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>ctipilot.ch — Per item</title><link>https://ctipilot.ch/</link><atom:link href="https://ctipilot.ch/feed-items.xml" rel="self" type="application/rss+xml"/><description>Individual content blocks from CTI briefs (Immediate Actions, Active Threats, Trending Vulnerabilities, Research, Updates, Deep Dive).</description><language>en</language><lastBuildDate>Fri, 08 May 2026 12:54:43 +0000</lastBuildDate><item><title>CVE-2026-5787 / CVE-2026-6973 — Ivanti EPMM pre-auth certificate impersonation → admin RCE (CISA KEV deadline **2026-05-10**)</title><link>https://ctipilot.ch/items/2026-05-08-cve-2026-5787-cve-2026-6973-ivanti-epmm-pre-auth-certificate-imperson/</link><guid isPermaLink="true">https://ctipilot.ch/items/2026-05-08-cve-2026-5787-cve-2026-6973-ivanti-epmm-pre-auth-certificate-imperson/</guid><pubDate>Fri, 08 May 2026 12:54:43 +0000</pubDate><dc:date>2026-05-08T12:54:43+00:00</dc:date><category>vulnerabilities</category><category>actively-exploited</category><category>pre-auth</category><category>rce</category><category>auth-bypass</category><category>cisa-kev</category><category>patch-available</category><category>global</category><category>exploited</category><category>cisa-kev</category><category>patch-available</category><category>CVE-2026-5787, CVE-2026-6973</category><description><![CDATA[<p>Ivanti disclosed two vulnerabilities in Endpoint Manager Mobile (EPMM) on-premises that chain into a fully pre-authenticated remote code execution path against the MDM server. <strong>CVE-2026-5787</strong> (CVSS 9.1, CWE-295) is an improper certificate validation flaw: an unauthenticated attacker who can reach the EPMM administrative network interface sends a crafted Sentry host registration request. EPMM fails to verify that the connecting host is an already-registered Sentry gateway and issues the attacker valid CA-signed client certificates with Sentry-level trust. Those certificates satisfy the authentication gate for <strong>CVE-2026-6973</strong> (CVSS 7.2, CWE-20), where improper input validation in an administrative API endpoint allows the now-&quot;authenticated&quot; actor to execute arbitrary OS commands at the EPMM service account&#39;s privilege level. The nominal &quot;admin required&quot; label on CVE-2026-6973 is therefore misleading — in practice the chain requires no prior credentials.</p>]]></description><content:encoded><![CDATA[<p>Ivanti disclosed two vulnerabilities in Endpoint Manager Mobile (EPMM) on-premises that chain into a fully pre-authenticated remote code execution path against the MDM server. <strong>CVE-2026-5787</strong> (CVSS 9.1, CWE-295) is an improper certificate validation flaw: an unauthenticated attacker who can reach the EPMM administrative network interface sends a crafted Sentry host registration request. EPMM fails to verify that the connecting host is an already-registered Sentry gateway and issues the attacker valid CA-signed client certificates with Sentry-level trust. Those certificates satisfy the authentication gate for <strong>CVE-2026-6973</strong> (CVSS 7.2, CWE-20), where improper input validation in an administrative API endpoint allows the now-&quot;authenticated&quot; actor to execute arbitrary OS commands at the EPMM service account&#39;s privilege level. The nominal &quot;admin required&quot; label on CVE-2026-6973 is therefore misleading — in practice the chain requires no prior credentials.</p>
<p>CISA added CVE-2026-6973 to the Known Exploited Vulnerabilities catalog (deadline <strong>2026-05-10</strong>) on the same day Ivanti disclosed the vulnerabilities (2026-05-07). Ivanti reported &quot;very limited exploitation in the wild&quot; at disclosure; CISA&#39;s simultaneous KEV listing confirms verified exploitation. Only on-premises EPMM is affected; Ivanti Neurons for MDM (cloud), EPM, Sentry as a standalone product, and EPMM mobile clients are unaffected. An estimated <strong>508 EPMM on-premises instances in the EU</strong> are internet-reachable (Censys/Shodan telemetry), concentrated in public-sector and healthcare verticals — both NIS2 Annex-I essential entities.</p>
<p><strong>Fixed versions:</strong> 12.6.1.1 (12.6.x branch), 12.7.0.1 (12.7.x branch), 12.8.0.1 (12.8.x branch).</p>
<p><strong>Immediate actions if patching within 24 hours is not feasible:</strong> Remove EPMM port 443 from internet exposure; place admin interface behind VPN with allowlisted management IPs; disable internet-facing Sentry registration endpoints; audit EPMM logs for unexpected Sentry <code>host_id</code> registration events.</p><aside class="item-footer"><span class="meta-sources"><strong>Sources:</strong> <a class="src-primary" href="https://www.ivanti.com/blog/may-2026-epmm-security-update" target="_blank" rel="noopener noreferrer">Ivanti — May 2026 EPMM Security Update</a> · <a class="src-additional" href="https://thehackernews.com/2026/05/ivanti-epmm-cve-2026-6973-rce-under.html" target="_blank" rel="noopener noreferrer">The Hacker News — Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation</a></span></aside>]]></content:encoded></item><item><title>CVE-2026-32202 — Windows Shell NTLM coercion / credential capture, APT28 active against EU governments (CISA KEV deadline **2026-05-12**)</title><link>https://ctipilot.ch/items/2026-05-08-cve-2026-32202-windows-shell-ntlm-coercion-credential-capture-apt28-a/</link><guid isPermaLink="true">https://ctipilot.ch/items/2026-05-08-cve-2026-32202-windows-shell-ntlm-coercion-credential-capture-apt28-a/</guid><pubDate>Fri, 08 May 2026 12:54:43 +0000</pubDate><dc:date>2026-05-08T12:54:43+00:00</dc:date><category>vulnerabilities</category><category>actively-exploited</category><category>nation-state</category><category>espionage</category><category>cisa-kev</category><category>patch-available</category><category>russia-nexus</category><category>europe</category><category>global</category><category>exploited</category><category>cisa-kev</category><category>patch-available</category><category>CVE-2026-32202</category><description><![CDATA[<p>A protection mechanism failure (CWE-693) in Windows Shell allows an unauthenticated, network-adjacent attacker to coerce outbound NTLM authentication from a target system after minimal user interaction with a crafted artefact (LNK file or similar Shell shortcut). When a user opens a directory containing the malicious artefact, the Shell resolves it and initiates an SMB connection to an attacker-controlled server, transmitting a NetNTLM credential hash. The attacker relays the hash for same-network lateral movement or cracks it offline to recover plaintext credentials. NVD CVSS is 4.3 (network vector, no privileges required, user interaction required), reflecting the coercion-only impact; in-the-wild exploitation and state-actor attribution make the operational risk materially higher.</p>]]></description><content:encoded><![CDATA[<p>A protection mechanism failure (CWE-693) in Windows Shell allows an unauthenticated, network-adjacent attacker to coerce outbound NTLM authentication from a target system after minimal user interaction with a crafted artefact (LNK file or similar Shell shortcut). When a user opens a directory containing the malicious artefact, the Shell resolves it and initiates an SMB connection to an attacker-controlled server, transmitting a NetNTLM credential hash. The attacker relays the hash for same-network lateral movement or cracks it offline to recover plaintext credentials. NVD CVSS is 4.3 (network vector, no privileges required, user interaction required), reflecting the coercion-only impact; in-the-wild exploitation and state-actor attribution make the operational risk materially higher.</p>
<p>Microsoft patched this in the April 2026 Patch Tuesday cycle. CISA added CVE-2026-32202 to KEV on 2026-04-28 with a deadline of <strong>2026-05-12</strong>. Threat intelligence attributes active exploitation to <strong>APT28 (GRU Unit 26165, &quot;Fancy Bear&quot;)</strong> targeting EU government ministries. The technique complements APT28&#39;s documented use of NTLM relay and pass-the-hash for lateral movement within government networks.</p>
<p><strong>Immediate actions:</strong> Apply April 2026 Windows Patch Tuesday; block outbound TCP 445 to non-business internet destinations at the perimeter firewall; enable &quot;Restrict NTLM&quot; Group Policy (set to &quot;Deny all&quot;) or migrate authentication to Kerberos-only where operationally feasible; monitor EDR for outbound 445/TCP to internet IPs from workstations.</p><aside class="item-footer"><span class="meta-sources"><strong>Sources:</strong> <a class="src-primary" href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32202" target="_blank" rel="noopener noreferrer">Microsoft MSRC — CVE-2026-32202</a> · <a class="src-additional" href="https://nvd.nist.gov/vuln/detail/CVE-2026-32202" target="_blank" rel="noopener noreferrer">NVD — CVE-2026-32202</a></span></aside>]]></content:encoded></item><item><title>Pro-Russian hacktivists modify OT pump settings at five Polish water treatment facilities</title><link>https://ctipilot.ch/items/2026-05-08-pro-russian-hacktivists-modify-ot-pump-settings-at-five-polish-water/</link><guid isPermaLink="true">https://ctipilot.ch/items/2026-05-08-pro-russian-hacktivists-modify-ot-pump-settings-at-five-polish-water/</guid><pubDate>Fri, 08 May 2026 12:54:43 +0000</pubDate><dc:date>2026-05-08T12:54:43+00:00</dc:date><category>nation-state</category><category>hacktivism</category><category>ot-ics</category><category>actively-exploited</category><category>russia-nexus</category><category>europe</category><description><![CDATA[<p>Poland&#39;s Internal Security Agency (ABW) disclosed that pro-Russian hacktivist actors penetrated the operational technology (OT) networks of five water treatment facilities and modified pump control parameters. At least one facility activated manual override procedures to prevent potential service disruption; no compromise of drinking water quality or supply loss was confirmed. ABW attributed the activity to actors operating in support of Russian geopolitical objectives but stopped short of formal state attribution. The attack pattern — IT/OT flat network exploitation leading to HMI manipulation — is consistent with prior campaigns attributed to <strong>NoName057(16)</strong> and <strong>Cyber Army of Russia Reborn</strong> in Central and Eastern European infrastructure. Polish water sector authorities and critical-infrastructure operators have been placed on heightened alert. The ABW advisory is a single-source national CERT/authority disclosure.</p>]]></description><content:encoded><![CDATA[<p>Poland&#39;s Internal Security Agency (ABW) disclosed that pro-Russian hacktivist actors penetrated the operational technology (OT) networks of five water treatment facilities and modified pump control parameters. At least one facility activated manual override procedures to prevent potential service disruption; no compromise of drinking water quality or supply loss was confirmed. ABW attributed the activity to actors operating in support of Russian geopolitical objectives but stopped short of formal state attribution. The attack pattern — IT/OT flat network exploitation leading to HMI manipulation — is consistent with prior campaigns attributed to <strong>NoName057(16)</strong> and <strong>Cyber Army of Russia Reborn</strong> in Central and Eastern European infrastructure. Polish water sector authorities and critical-infrastructure operators have been placed on heightened alert. The ABW advisory is a single-source national CERT/authority disclosure.</p><aside class="item-footer"><span class="meta-sources"><strong>Sources:</strong> <a class="src-primary" href="https://abw.gov.pl/pl/cyberbezpieczenstwo/" target="_blank" rel="noopener noreferrer">ABW — Cybersecurity Alert, Polish Water Sector OT Intrusion</a></span></aside>]]></content:encoded></item><item><title>MuddyWater (Iran/MOIS) deploys Chaos ransomware as false flag; harvests credentials via Teams</title><link>https://ctipilot.ch/items/2026-05-08-muddywater-iran-mois-deploys-chaos-ransomware-as-false-flag-harvests/</link><guid isPermaLink="true">https://ctipilot.ch/items/2026-05-08-muddywater-iran-mois-deploys-chaos-ransomware-as-false-flag-harvests/</guid><pubDate>Fri, 08 May 2026 12:54:43 +0000</pubDate><dc:date>2026-05-08T12:54:43+00:00</dc:date><category>nation-state</category><category>espionage</category><category>ransomware</category><category>phishing</category><category>identity</category><category>iran-nexus</category><category>europe</category><category>middle-east</category><description><![CDATA[<p>Security researchers documented a refreshed campaign by <strong>MuddyWater</strong> (attributed to Iran&#39;s Ministry of Intelligence and Security, MOIS), targeting government contractors and defence-adjacent organisations in Europe and the Middle East. The campaign deploys <strong>Chaos</strong> ransomware payloads with branding designed to mimic criminal ransomware groups — a deliberate false-flag technique intended to complicate attribution and delay incident response triage. A parallel social-engineering vector uses Microsoft Teams external-access invitations to gain remote-assistance sessions under a helpdesk pretext, after which credentials are harvested and used for further access via legitimate cloud services. Observed ATT&amp;CK techniques: T1566.004 (Spearphishing via Teams), T1649 (Steal or Forge Authentication Certificates), T1486 (Data Encrypted for Impact). This is a single-source threat-intelligence vendor disclosure.</p>]]></description><content:encoded><![CDATA[<p>Security researchers documented a refreshed campaign by <strong>MuddyWater</strong> (attributed to Iran&#39;s Ministry of Intelligence and Security, MOIS), targeting government contractors and defence-adjacent organisations in Europe and the Middle East. The campaign deploys <strong>Chaos</strong> ransomware payloads with branding designed to mimic criminal ransomware groups — a deliberate false-flag technique intended to complicate attribution and delay incident response triage. A parallel social-engineering vector uses Microsoft Teams external-access invitations to gain remote-assistance sessions under a helpdesk pretext, after which credentials are harvested and used for further access via legitimate cloud services. Observed ATT&amp;CK techniques: T1566.004 (Spearphishing via Teams), T1649 (Steal or Forge Authentication Certificates), T1486 (Data Encrypted for Impact). This is a single-source threat-intelligence vendor disclosure.</p><aside class="item-footer"><span class="meta-sources"><strong>Sources:</strong> <a class="src-primary" href="https://www.deepinstinct.com/blog/muddywater-2026" target="_blank" rel="noopener noreferrer">Deep Instinct Threat Intelligence — MuddyWater 2026 Campaign</a></span></aside>]]></content:encoded></item><item><title>Qilin ransomware hits Die Linke (Germany): 1.5 TB claimed, DPA notified (~April 2026, first coverage)</title><link>https://ctipilot.ch/items/2026-05-08-qilin-ransomware-hits-die-linke-germany-1-5-tb-claimed-dpa-notified-a/</link><guid isPermaLink="true">https://ctipilot.ch/items/2026-05-08-qilin-ransomware-hits-die-linke-germany-1-5-tb-claimed-dpa-notified-a/</guid><pubDate>Fri, 08 May 2026 12:54:43 +0000</pubDate><dc:date>2026-05-08T12:54:43+00:00</dc:date><category>ransomware</category><category>data-breach</category><category>europe</category><category>dach</category><description><![CDATA[<p>The German federal party Die Linke confirmed in April 2026 that the <strong>Qilin</strong> ransomware group (also known as Agenda, a Rust-based RaaS platform known for double extortion) encrypted and exfiltrated its systems, with the gang claiming 1.5 TB of internal data. The party&#39;s data protection officer notified the responsible <em>Landesdatenschutzbehörde</em> (state DPA). Die Linke issued a victim statement acknowledging operational disruption; no ransom figure has been publicly disclosed. Qilin has targeted political parties and civil-society organisations across Western Europe since 2023. This breach is approximately four weeks old but has not been previously covered in this brief series.</p>]]></description><content:encoded><![CDATA[<p>The German federal party Die Linke confirmed in April 2026 that the <strong>Qilin</strong> ransomware group (also known as Agenda, a Rust-based RaaS platform known for double extortion) encrypted and exfiltrated its systems, with the gang claiming 1.5 TB of internal data. The party&#39;s data protection officer notified the responsible <em>Landesdatenschutzbehörde</em> (state DPA). Die Linke issued a victim statement acknowledging operational disruption; no ransom figure has been publicly disclosed. Qilin has targeted political parties and civil-society organisations across Western Europe since 2023. This breach is approximately four weeks old but has not been previously covered in this brief series.</p><aside class="item-footer"><span class="meta-sources"><strong>Sources:</strong> <a class="src-primary" href="https://www.heise.de/news/" target="_blank" rel="noopener noreferrer">Heise Online — Ransomware-Angriff auf Die Linke</a></span></aside>]]></content:encoded></item><item><title>Eurail breach: 308 777 travellers notified three months after December 2025 compromise; Dutch DPA and EDPS open reviews</title><link>https://ctipilot.ch/items/2026-05-08-eurail-breach-308-777-travellers-notified-three-months-after-december/</link><guid isPermaLink="true">https://ctipilot.ch/items/2026-05-08-eurail-breach-308-777-travellers-notified-three-months-after-december/</guid><pubDate>Fri, 08 May 2026 12:54:43 +0000</pubDate><dc:date>2026-05-08T12:54:43+00:00</dc:date><category>data-breach</category><category>europe</category><description><![CDATA[<p>Eurail began issuing breach notifications to <strong>308 777 customers</strong> in late April 2026, revealing that an attacker accessed personal data — including <strong>passport numbers, IBANs, and DiscoverEU pass details</strong> — in a December 2025 incident. The three-month gap between discovery and notification is under review by the <strong>Autoriteit Persoonsgegevens</strong> (Dutch DPA) and the <strong>European Data Protection Supervisor (EDPS)</strong>, which holds jurisdiction over EU institutional data processing. GDPR Article 33 requires supervisory authority notification within 72 hours of awareness of a breach. The exposed dataset covers travellers from EU member states who registered DiscoverEU passes; Swiss nationals who applied through bilateral arrangement may also be affected. Affected individuals should monitor for identity fraud and, where banking regulations permit, consider IBAN replacement.</p>]]></description><content:encoded><![CDATA[<p>Eurail began issuing breach notifications to <strong>308 777 customers</strong> in late April 2026, revealing that an attacker accessed personal data — including <strong>passport numbers, IBANs, and DiscoverEU pass details</strong> — in a December 2025 incident. The three-month gap between discovery and notification is under review by the <strong>Autoriteit Persoonsgegevens</strong> (Dutch DPA) and the <strong>European Data Protection Supervisor (EDPS)</strong>, which holds jurisdiction over EU institutional data processing. GDPR Article 33 requires supervisory authority notification within 72 hours of awareness of a breach. The exposed dataset covers travellers from EU member states who registered DiscoverEU passes; Swiss nationals who applied through bilateral arrangement may also be affected. Affected individuals should monitor for identity fraud and, where banking regulations permit, consider IBAN replacement.</p><aside class="item-footer"><span class="meta-sources"><strong>Sources:</strong> <a class="src-primary" href="https://nos.nl/artikel/" target="_blank" rel="noopener noreferrer">NOS Nieuws — Eurail datalek</a></span></aside>]]></content:encoded></item><item><title>CERT-FR CERTFR-2026-ACT-016: Agentic AI tools introduce prompt-injection and supply-chain attack surfaces</title><link>https://ctipilot.ch/items/2026-05-08-cert-fr-certfr-2026-act-016-agentic-ai-tools-introduce-prompt-injecti/</link><guid isPermaLink="true">https://ctipilot.ch/items/2026-05-08-cert-fr-certfr-2026-act-016-agentic-ai-tools-introduce-prompt-injecti/</guid><pubDate>Fri, 08 May 2026 12:54:43 +0000</pubDate><dc:date>2026-05-08T12:54:43+00:00</dc:date><category>ai-abuse</category><category>supply-chain</category><category>europe</category><description><![CDATA[<p>France&#39;s CERT-FR published advisory CERTFR-2026-ACT-016 warning that deploying agentic AI orchestration platforms (LLM-driven workflows with tool-calling, MCP server integration, or autonomous execution capabilities) introduces novel attack vectors. The advisory identifies three risk classes: <strong>prompt-injection via processed documents or websites</strong> (attacker embeds instructions in content the agent processes, redirecting its actions); <strong>MCP server supply-chain compromise</strong> (a malicious or compromised Model Context Protocol server can issue instructions to all connected agents); and <strong>insufficient sandboxing</strong> of agent execution environments, where agents with filesystem or network access can be weaponised. CERT-FR recommends input/output guardrails, strict allowlisting of permitted tool calls, human-in-the-loop gates for high-impact actions, and treating all AI agent outputs as untrusted until validated. Relevant for organisations deploying Claude Agents, Microsoft Copilot Studio, AutoGen, or similar agentic frameworks for workflow automation.</p>]]></description><content:encoded><![CDATA[<p>France&#39;s CERT-FR published advisory CERTFR-2026-ACT-016 warning that deploying agentic AI orchestration platforms (LLM-driven workflows with tool-calling, MCP server integration, or autonomous execution capabilities) introduces novel attack vectors. The advisory identifies three risk classes: <strong>prompt-injection via processed documents or websites</strong> (attacker embeds instructions in content the agent processes, redirecting its actions); <strong>MCP server supply-chain compromise</strong> (a malicious or compromised Model Context Protocol server can issue instructions to all connected agents); and <strong>insufficient sandboxing</strong> of agent execution environments, where agents with filesystem or network access can be weaponised. CERT-FR recommends input/output guardrails, strict allowlisting of permitted tool calls, human-in-the-loop gates for high-impact actions, and treating all AI agent outputs as untrusted until validated. Relevant for organisations deploying Claude Agents, Microsoft Copilot Studio, AutoGen, or similar agentic frameworks for workflow automation.</p><aside class="item-footer"><span class="meta-sources"><strong>Sources:</strong> <a class="src-primary" href="https://www.cert.ssi.gouv.fr/actualite/CERTFR-2026-ACT-016/" target="_blank" rel="noopener noreferrer">CERT-FR — CERTFR-2026-ACT-016</a></span></aside>]]></content:encoded></item><item><title>CVE-2026-5787 — Ivanti EPMM improper certificate validation (pre-auth Sentry impersonation, CVSS 9.1)</title><link>https://ctipilot.ch/items/2026-05-08-cve-2026-5787-ivanti-epmm-improper-certificate-validation-pre-auth-se/</link><guid isPermaLink="true">https://ctipilot.ch/items/2026-05-08-cve-2026-5787-ivanti-epmm-improper-certificate-validation-pre-auth-se/</guid><pubDate>Fri, 08 May 2026 12:54:43 +0000</pubDate><dc:date>2026-05-08T12:54:43+00:00</dc:date><category>vulnerabilities</category><category>actively-exploited</category><category>pre-auth</category><category>auth-bypass</category><category>cisa-kev</category><category>patch-available</category><category>global</category><category>exploited</category><category>cisa-kev</category><category>patch-available</category><category>CVE-2026-5787</category><description><![CDATA[<p>EPMM&#39;s internal PKI issues CA-signed certificates to registered Sentry gateway hosts upon verified registration. CVE-2026-5787 (CWE-295) is a failure in that verification: an attacker submits a crafted registration request and EPMM issues a valid CA-signed certificate without confirming prior registration. The certificate carries Sentry-level trust and satisfies EPMM&#39;s administrative authentication gate, enabling the CVE-2026-6973 chain. No workaround fully mitigates CVE-2026-5787 in isolation; patching is required. Affected: all on-prem EPMM &lt; 12.6.1.1 / 12.7.0.1 / 12.8.0.1.</p>]]></description><content:encoded><![CDATA[<p>EPMM&#39;s internal PKI issues CA-signed certificates to registered Sentry gateway hosts upon verified registration. CVE-2026-5787 (CWE-295) is a failure in that verification: an attacker submits a crafted registration request and EPMM issues a valid CA-signed certificate without confirming prior registration. The certificate carries Sentry-level trust and satisfies EPMM&#39;s administrative authentication gate, enabling the CVE-2026-6973 chain. No workaround fully mitigates CVE-2026-5787 in isolation; patching is required. Affected: all on-prem EPMM &lt; 12.6.1.1 / 12.7.0.1 / 12.8.0.1.</p><aside class="item-footer"><span class="meta-sources"><strong>Sources:</strong> <a class="src-primary" href="https://nvd.nist.gov/vuln/detail/CVE-2026-5787" target="_blank" rel="noopener noreferrer">NVD — CVE-2026-5787</a></span></aside>]]></content:encoded></item><item><title>CVE-2026-6973 — Ivanti EPMM admin API improper input validation → RCE (CVSS 7.2, CISA KEV deadline 2026-05-10)</title><link>https://ctipilot.ch/items/2026-05-08-cve-2026-6973-ivanti-epmm-admin-api-improper-input-validation-rce-cvs/</link><guid isPermaLink="true">https://ctipilot.ch/items/2026-05-08-cve-2026-6973-ivanti-epmm-admin-api-improper-input-validation-rce-cvs/</guid><pubDate>Fri, 08 May 2026 12:54:43 +0000</pubDate><dc:date>2026-05-08T12:54:43+00:00</dc:date><category>vulnerabilities</category><category>actively-exploited</category><category>rce</category><category>cisa-kev</category><category>patch-available</category><category>global</category><category>exploited</category><category>cisa-kev</category><category>patch-available</category><category>CVE-2026-6973</category><description><![CDATA[<p>An authenticated administrative user can pass crafted input to an EPMM REST API endpoint, triggering OS-level code execution at the service account privilege level (CWE-20). Standalone, this requires admin credentials; chained after CVE-2026-5787 it is fully pre-auth. CISA KEV deadline: <strong>2026-05-10</strong>. EU internet-exposed on-prem instances: approx. 508 (Censys/Shodan). Fixed in 12.6.1.1, 12.7.0.1, 12.8.0.1. See § 7 for detailed chain mechanics.</p>]]></description><content:encoded><![CDATA[<p>An authenticated administrative user can pass crafted input to an EPMM REST API endpoint, triggering OS-level code execution at the service account privilege level (CWE-20). Standalone, this requires admin credentials; chained after CVE-2026-5787 it is fully pre-auth. CISA KEV deadline: <strong>2026-05-10</strong>. EU internet-exposed on-prem instances: approx. 508 (Censys/Shodan). Fixed in 12.6.1.1, 12.7.0.1, 12.8.0.1. See § 7 for detailed chain mechanics.</p><aside class="item-footer"><span class="meta-sources"><strong>Sources:</strong> <a class="src-primary" href="https://nvd.nist.gov/vuln/detail/CVE-2026-6973" target="_blank" rel="noopener noreferrer">NVD — CVE-2026-6973</a></span></aside>]]></content:encoded></item><item><title>CVE-2026-32202 — Windows Shell NTLM coercion, APT28 ITW (CVSS 4.3, CISA KEV deadline 2026-05-12)</title><link>https://ctipilot.ch/items/2026-05-08-cve-2026-32202-windows-shell-ntlm-coercion-apt28-itw-cvss-4-3-cisa-ke/</link><guid isPermaLink="true">https://ctipilot.ch/items/2026-05-08-cve-2026-32202-windows-shell-ntlm-coercion-apt28-itw-cvss-4-3-cisa-ke/</guid><pubDate>Fri, 08 May 2026 12:54:43 +0000</pubDate><dc:date>2026-05-08T12:54:43+00:00</dc:date><category>vulnerabilities</category><category>actively-exploited</category><category>nation-state</category><category>cisa-kev</category><category>patch-available</category><category>russia-nexus</category><category>europe</category><category>global</category><category>exploited</category><category>cisa-kev</category><category>patch-available</category><category>CVE-2026-32202</category><description><![CDATA[<p>A crafted Windows Shell artefact (LNK shortcut) placed in a directory causes the victim host to initiate an outbound SMB authentication to an attacker-controlled server when the directory is opened, transmitting NetNTLM hashes. APT28 has weaponised this against EU government ministries. Despite the low NVD CVSS (4.3), KEV listing and state-actor ITW exploitation make this a priority-patch item. Apply April 2026 Windows cumulative updates. CISA KEV deadline: <strong>2026-05-12</strong>.</p>]]></description><content:encoded><![CDATA[<p>A crafted Windows Shell artefact (LNK shortcut) placed in a directory causes the victim host to initiate an outbound SMB authentication to an attacker-controlled server when the directory is opened, transmitting NetNTLM hashes. APT28 has weaponised this against EU government ministries. Despite the low NVD CVSS (4.3), KEV listing and state-actor ITW exploitation make this a priority-patch item. Apply April 2026 Windows cumulative updates. CISA KEV deadline: <strong>2026-05-12</strong>.</p><aside class="item-footer"><span class="meta-sources"><strong>Sources:</strong> <a class="src-primary" href="https://nvd.nist.gov/vuln/detail/CVE-2026-32202" target="_blank" rel="noopener noreferrer">NVD — CVE-2026-32202</a></span></aside>]]></content:encoded></item><item><title>GLPI CERTFR-2026-AVI-0551 — Seven CVEs including SSRF and XSS in EU ITSM platform (advisory 2026-04-29)</title><link>https://ctipilot.ch/items/2026-05-08-glpi-certfr-2026-avi-0551-seven-cves-including-ssrf-and-xss-in-eu-its/</link><guid isPermaLink="true">https://ctipilot.ch/items/2026-05-08-glpi-certfr-2026-avi-0551-seven-cves-including-ssrf-and-xss-in-eu-its/</guid><pubDate>Fri, 08 May 2026 12:54:43 +0000</pubDate><dc:date>2026-05-08T12:54:43+00:00</dc:date><category>vulnerabilities</category><category>patch-available</category><category>europe</category><category>CVE-2026-32312, CVE-2026-40108, CVE-2026-42317, CVE-2026-42318, CVE-2026-42320, CVE-2026-42321, CVE-2026-5385</category><description><![CDATA[<p>France&#39;s CERT-FR published CERTFR-2026-AVI-0551 (April 29, 2026) covering seven CVEs in GLPI, the open-source IT Service Management platform widely deployed in European public-sector organisations and healthcare networks. Vulnerability types include SSRF (CVE-2026-32312), stored and reflected XSS (CVE-2026-42317, CVE-2026-42318, CVE-2026-42320, CVE-2026-42321), security policy bypass (CVE-2026-5385), and data integrity compromise (CVE-2026-40108). CVSS scores are not published in the advisory. No exploitation in the wild is confirmed. GLPI administrators should upgrade to version ≥ 10.0.25 (10.0.x branch) or ≥ 11.0.7 (11.x branch). Swiss federal and cantonal administrations and hospitals using GLPI as their ITSM are advised to schedule patching within the standard change window.</p>]]></description><content:encoded><![CDATA[<p>France&#39;s CERT-FR published CERTFR-2026-AVI-0551 (April 29, 2026) covering seven CVEs in GLPI, the open-source IT Service Management platform widely deployed in European public-sector organisations and healthcare networks. Vulnerability types include SSRF (CVE-2026-32312), stored and reflected XSS (CVE-2026-42317, CVE-2026-42318, CVE-2026-42320, CVE-2026-42321), security policy bypass (CVE-2026-5385), and data integrity compromise (CVE-2026-40108). CVSS scores are not published in the advisory. No exploitation in the wild is confirmed. GLPI administrators should upgrade to version ≥ 10.0.25 (10.0.x branch) or ≥ 11.0.7 (11.x branch). Swiss federal and cantonal administrations and hospitals using GLPI as their ITSM are advised to schedule patching within the standard change window.</p><aside class="item-footer"><span class="meta-sources"><strong>Sources:</strong> <a class="src-primary" href="https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0551/" target="_blank" rel="noopener noreferrer">CERT-FR — CERTFR-2026-AVI-0551</a></span></aside>]]></content:encoded></item><item><title>Dragos 2025 OT Cybersecurity Year in Review: 81% of IR engagements found flat IT/OT network architecture</title><link>https://ctipilot.ch/items/2026-05-08-dragos-2025-ot-cybersecurity-year-in-review-81-of-ir-engagements-foun/</link><guid isPermaLink="true">https://ctipilot.ch/items/2026-05-08-dragos-2025-ot-cybersecurity-year-in-review-81-of-ir-engagements-foun/</guid><pubDate>Fri, 08 May 2026 12:54:43 +0000</pubDate><dc:date>2026-05-08T12:54:43+00:00</dc:date><category>ot-ics</category><category>global</category><description><![CDATA[<p>Dragos released its <em>2025 OT Cybersecurity Year in Review — Frontlines IR Edition</em> synthesising findings from industrial incident response engagements. Key statistics: <strong>81% of engagements identified no meaningful IT/OT network segmentation</strong>, with operational networks reachable directly from enterprise IT; initial access via internet-exposed remote access tools (internet-facing HMI, unprotected VPN termination, or engineering workstation RDP) was the dominant entry vector in 62% of cases; and 34% of confirmed OT intrusions progressed to the operational process level before detection. The report documents NIS2 Annex-I compliance gaps, noting that many essential OT-operating entities have not completed required asset inventory reviews, which the report identifies as the most common control weakness. The IEC 62443 zoning and conduit model is highlighted as the primary reference architecture for remediation. Relevant to Swiss organisations operating under NCSC sector-specific ICS guidance (SARI framework).</p>]]></description><content:encoded><![CDATA[<p>Dragos released its <em>2025 OT Cybersecurity Year in Review — Frontlines IR Edition</em> synthesising findings from industrial incident response engagements. Key statistics: <strong>81% of engagements identified no meaningful IT/OT network segmentation</strong>, with operational networks reachable directly from enterprise IT; initial access via internet-exposed remote access tools (internet-facing HMI, unprotected VPN termination, or engineering workstation RDP) was the dominant entry vector in 62% of cases; and 34% of confirmed OT intrusions progressed to the operational process level before detection. The report documents NIS2 Annex-I compliance gaps, noting that many essential OT-operating entities have not completed required asset inventory reviews, which the report identifies as the most common control weakness. The IEC 62443 zoning and conduit model is highlighted as the primary reference architecture for remediation. Relevant to Swiss organisations operating under NCSC sector-specific ICS guidance (SARI framework).</p><aside class="item-footer"><span class="meta-sources"><strong>Sources:</strong> <a class="src-primary" href="https://www.dragos.com/year-in-review/" target="_blank" rel="noopener noreferrer">Dragos — 2025 OT Cybersecurity Year in Review</a></span></aside>]]></content:encoded></item><item><title>Kaspersky Q1 2026 Exploits and Vulnerabilities Report: document-based exploits resurge; RaaS acquires zero-days</title><link>https://ctipilot.ch/items/2026-05-08-kaspersky-q1-2026-exploits-and-vulnerabilities-report-document-based/</link><guid isPermaLink="true">https://ctipilot.ch/items/2026-05-08-kaspersky-q1-2026-exploits-and-vulnerabilities-report-document-based/</guid><pubDate>Fri, 08 May 2026 12:54:43 +0000</pubDate><dc:date>2026-05-08T12:54:43+00:00</dc:date><category>vulnerabilities</category><category>zero-day</category><category>ransomware</category><category>global</category><description><![CDATA[<p>Kaspersky&#39;s quarterly exploitation analysis for Q1 2026 identifies a marked resurgence in document-based exploit delivery, with Microsoft Office and PDF readers accounting for the largest share of initial-access exploit deployments. The most exploited CVE class involved Office Protected View bypass chains (multiple CVEs published in January 2026 Patch Tuesday). Browser exploitation via V8 memory corruption grew 34% quarter-on-quarter. A significant structural trend: ransomware-as-a-service operators are increasingly acquiring zero-day exploits directly from private brokers rather than relying on publicly available PoC code, shortening the detection window between disclosure and mass exploitation. The report includes Excel macro delivery via cloud storage abuse as an emerging initial-access technique.</p>]]></description><content:encoded><![CDATA[<p>Kaspersky&#39;s quarterly exploitation analysis for Q1 2026 identifies a marked resurgence in document-based exploit delivery, with Microsoft Office and PDF readers accounting for the largest share of initial-access exploit deployments. The most exploited CVE class involved Office Protected View bypass chains (multiple CVEs published in January 2026 Patch Tuesday). Browser exploitation via V8 memory corruption grew 34% quarter-on-quarter. A significant structural trend: ransomware-as-a-service operators are increasingly acquiring zero-day exploits directly from private brokers rather than relying on publicly available PoC code, shortening the detection window between disclosure and mass exploitation. The report includes Excel macro delivery via cloud storage abuse as an emerging initial-access technique.</p><aside class="item-footer"><span class="meta-sources"><strong>Sources:</strong> <a class="src-primary" href="https://securelist.com/exploits-vulnerabilities-q1-2026/" target="_blank" rel="noopener noreferrer">Kaspersky Securelist — Exploits and Vulnerabilities Q1 2026</a></span></aside>]]></content:encoded></item><item><title>Amazon SES weaponised for authenticated phishing and BEC (Kaspersky, 2026-05-04, ~96 h)</title><link>https://ctipilot.ch/items/2026-05-08-amazon-ses-weaponised-for-authenticated-phishing-and-bec-kaspersky-20/</link><guid isPermaLink="true">https://ctipilot.ch/items/2026-05-08-amazon-ses-weaponised-for-authenticated-phishing-and-bec-kaspersky-20/</guid><pubDate>Fri, 08 May 2026 12:54:43 +0000</pubDate><dc:date>2026-05-08T12:54:43+00:00</dc:date><category>phishing</category><category>cloud</category><category>europe</category><category>global</category><description><![CDATA[<p>Kaspersky researchers documented a campaign technique using legitimate <strong>Amazon Simple Email Service (SES)</strong> accounts to deliver attacker-crafted phishing and business-email-compromise (BEC) lures. Because messages originate from genuine SES infrastructure, SPF and DKIM authentication passes and messages evade most email security gateway filters based on sender reputation. Attackers obtain SES API credentials from publicly exposed AWS configuration files (S3 bucket misconfigurations, leaked GitHub repositories). Observed campaign goals include invoice-fraud lures targeting finance departments and credential phishing pages hosted on AWS infrastructure. Kaspersky observed targeting of finance departments at European manufacturing firms. This report is approximately 96 hours old at publication; first coverage in this brief series.</p>]]></description><content:encoded><![CDATA[<p>Kaspersky researchers documented a campaign technique using legitimate <strong>Amazon Simple Email Service (SES)</strong> accounts to deliver attacker-crafted phishing and business-email-compromise (BEC) lures. Because messages originate from genuine SES infrastructure, SPF and DKIM authentication passes and messages evade most email security gateway filters based on sender reputation. Attackers obtain SES API credentials from publicly exposed AWS configuration files (S3 bucket misconfigurations, leaked GitHub repositories). Observed campaign goals include invoice-fraud lures targeting finance departments and credential phishing pages hosted on AWS infrastructure. Kaspersky observed targeting of finance departments at European manufacturing firms. This report is approximately 96 hours old at publication; first coverage in this brief series.</p><aside class="item-footer"><span class="meta-sources"><strong>Sources:</strong> <a class="src-primary" href="https://securelist.com/amazon-ses-bec-campaign-2026/" target="_blank" rel="noopener noreferrer">Kaspersky Securelist — Amazon SES BEC Campaign (2026-05-04)</a></span></aside>]]></content:encoded></item><item><title>UPDATE — CVE-2026-0300 (PAN-OS Captive Portal unauthenticated root RCE): CISA KEV deadline is **today (2026-05-09)**; no patch until 2026-05-13</title><link>https://ctipilot.ch/items/2026-05-08-update-cve-2026-0300-pan-os-captive-portal-unauthenticated-root-rce-c/</link><guid isPermaLink="true">https://ctipilot.ch/items/2026-05-08-update-cve-2026-0300-pan-os-captive-portal-unauthenticated-root-rce-c/</guid><pubDate>Fri, 08 May 2026 12:54:43 +0000</pubDate><dc:date>2026-05-08T12:54:43+00:00</dc:date><category>vulnerabilities</category><category>actively-exploited</category><category>cisa-kev</category><category>rce</category><category>pre-auth</category><category>global</category><category>CVE-2026-0300</category><description><![CDATA[<p>(First covered and deep-dived 2026-05-07.) The CISA KEV federal remediation deadline for CVE-2026-0300 is <strong>2026-05-09 — today</strong>. Palo Alto Networks has not released a permanent patch for any PAN-OS branch; the earliest patch ETA is 2026-05-13. The mandated mitigation remains: disable the Captive Portal / Authentication Portal feature on internet-facing GlobalProtect gateway interfaces, or restrict access exclusively to trusted internal management IP ranges. PAN-OS 11.1+ deployments should confirm Threat Prevention profile with Threat ID 510019 is active on the internet-facing zone. Organisations that have not yet applied the mitigation should treat this as a P0 action today before business opens.</p>]]></description><content:encoded><![CDATA[<p>(First covered and deep-dived 2026-05-07.) The CISA KEV federal remediation deadline for CVE-2026-0300 is <strong>2026-05-09 — today</strong>. Palo Alto Networks has not released a permanent patch for any PAN-OS branch; the earliest patch ETA is 2026-05-13. The mandated mitigation remains: disable the Captive Portal / Authentication Portal feature on internet-facing GlobalProtect gateway interfaces, or restrict access exclusively to trusted internal management IP ranges. PAN-OS 11.1+ deployments should confirm Threat Prevention profile with Threat ID 510019 is active on the internet-facing zone. Organisations that have not yet applied the mitigation should treat this as a P0 action today before business opens.</p><aside class="item-footer"><span class="meta-sources"><strong>Sources:</strong> <a class="src-primary" href="https://security.paloaltonetworks.com/CVE-2026-0300" target="_blank" rel="noopener noreferrer">Palo Alto Networks PSIRT — CVE-2026-0300</a></span></aside>]]></content:encoded></item><item><title>UPDATE — Instructure/Canvas extortion: 330 institutions across six countries; May 12 extortion deadline; 44 Dutch institutions confirmed</title><link>https://ctipilot.ch/items/2026-05-08-update-instructure-canvas-extortion-330-institutions-across-six-count/</link><guid isPermaLink="true">https://ctipilot.ch/items/2026-05-08-update-instructure-canvas-extortion-330-institutions-across-six-count/</guid><pubDate>Fri, 08 May 2026 12:54:43 +0000</pubDate><dc:date>2026-05-08T12:54:43+00:00</dc:date><category>data-breach</category><category>ransomware</category><category>europe</category><description><![CDATA[<p>(First covered 2026-05-06.) The Instructure/Canvas breach has expanded significantly in scope. The threat actor now claims access affecting <strong>330 institutions</strong> across six countries, threatening to publish 16 million student and staff records. <strong>SURF</strong> (the Dutch National Research and Education Network) has confirmed <strong>44 Dutch institutions</strong> among the victims. The attacker posted portal defacements at multiple universities and established a <strong>2026-05-12 extortion deadline</strong> for ransom payment. Canvas services were taken offline again on 2026-05-07 for emergency patching. European DPAs in the Netherlands and Germany have opened preliminary inquiries into notification timing. Institutions using Canvas should assess GDPR Article 33/34 breach notification obligations before the May 12 deadline.</p>]]></description><content:encoded><![CDATA[<p>(First covered 2026-05-06.) The Instructure/Canvas breach has expanded significantly in scope. The threat actor now claims access affecting <strong>330 institutions</strong> across six countries, threatening to publish 16 million student and staff records. <strong>SURF</strong> (the Dutch National Research and Education Network) has confirmed <strong>44 Dutch institutions</strong> among the victims. The attacker posted portal defacements at multiple universities and established a <strong>2026-05-12 extortion deadline</strong> for ransom payment. Canvas services were taken offline again on 2026-05-07 for emergency patching. European DPAs in the Netherlands and Germany have opened preliminary inquiries into notification timing. Institutions using Canvas should assess GDPR Article 33/34 breach notification obligations before the May 12 deadline.</p><aside class="item-footer"><span class="meta-sources"><strong>Sources:</strong> <a class="src-primary" href="https://www.surf.nl/actualiteiten/2026/canvas-security-update" target="_blank" rel="noopener noreferrer">SURF Security Advisory — Canvas Extortion Update</a></span></aside>]]></content:encoded></item><item><title>§ 7 — Deep Dive: Ivanti EPMM CVE-2026-5787 → CVE-2026-6973 — Pre-Auth Certificate Impersonation Chaining to RCE in Enterprise Mobile Device Management</title><link>https://ctipilot.ch/briefs/2026-05-08/#7-deep-dive-ivanti-epmm-cve-2026-5787-cve-2026-6973-pre-auth-certificate-impersonation-chaining-to-rce-in-enterprise-mobile-device-management</link><guid isPermaLink="true">https://ctipilot.ch/briefs/2026-05-08/#7-deep-dive-ivanti-epmm-cve-2026-5787-cve-2026-6973-pre-auth-certificate-impersonation-chaining-to-rce-in-enterprise-mobile-device-management</guid><pubDate>Fri, 08 May 2026 12:54:43 +0000</pubDate><dc:date>2026-05-08T12:54:43+00:00</dc:date><category>vulnerabilities</category><category>actively-exploited</category><category>pre-auth</category><category>rce</category><category>auth-bypass</category><category>cisa-kev</category><category>patch-available</category><category>global</category><category>exploited</category><category>cisa-kev</category><category>patch-available</category><category>CVE-2026-5787, CVE-2026-6973</category><description><![CDATA[<p><strong>Background and target value.</strong> Ivanti Endpoint Manager Mobile (EPMM), formerly MobileIron Core, is one of the two dominant on-premises MDM platforms in European enterprise and public-sector environments. MDM servers are exceptionally high-value targets: they hold device enrolment certificates, configuration profiles, SCEP/NDES CA material, application distribution packages, and — in most architectures — are authorised to silently push policy updates, configurations, or wipe enrolled devices fleet-wide. A compromised EPMM server gives an attacker persistent, trusted command over every enrolled mobile device in the organisation, representing a direct path to the complete endpoint fleet. European governments and healthcare systems are among the heaviest EPMM on-premises adopters, making the EU concentration of exposed instances (est. 508) particularly significant.</p>]]></description><content:encoded><![CDATA[<p><strong>Background and target value.</strong> Ivanti Endpoint Manager Mobile (EPMM), formerly MobileIron Core, is one of the two dominant on-premises MDM platforms in European enterprise and public-sector environments. MDM servers are exceptionally high-value targets: they hold device enrolment certificates, configuration profiles, SCEP/NDES CA material, application distribution packages, and — in most architectures — are authorised to silently push policy updates, configurations, or wipe enrolled devices fleet-wide. A compromised EPMM server gives an attacker persistent, trusted command over every enrolled mobile device in the organisation, representing a direct path to the complete endpoint fleet. European governments and healthcare systems are among the heaviest EPMM on-premises adopters, making the EU concentration of exposed instances (est. 508) particularly significant.</p>
<p><strong>CVE-2026-5787: Certificate validation failure in Sentry host registration (CVSS 9.1, CWE-295)</strong></p>
<p>EPMM&#39;s architecture includes a component called <strong>Sentry</strong> — a protocol-translating reverse proxy that mediates traffic between enrolled mobile devices and corporate backend services (Exchange ActiveSync, SharePoint, etc.). The EPMM server and its registered Sentry gateways maintain mutual trust via an internal PKI: when a Sentry host onboards, EPMM verifies its identity and issues it a CA-signed certificate that subsequent API calls present for authentication.</p>
<p>CVE-2026-5787 is a failure in the certificate issuance verification step. The EPMM server does not adequately validate that a host requesting Sentry registration is genuinely in the pre-approved registration queue before issuing a signed certificate. An unauthenticated attacker who can reach the EPMM administrative endpoint (TCP 443) submits a crafted Sentry registration request. EPMM accepts it as legitimate and issues the attacker a <strong>valid CA-signed client certificate</strong> carrying Sentry-level trust. That certificate is the key to the second vulnerability.</p>
<p><strong>CVE-2026-6973: Admin API improper input validation → OS command execution (CVSS 7.2, CWE-20)</strong></p>
<p>EPMM exposes a REST API for administrative operations. One or more endpoints in the affected version range accept parameters that are passed to a server-side execution context (OS command constructor, file path handler, or template engine — the exact sink is not publicly disclosed by Ivanti) without adequate sanitisation. An actor authenticated as an administrator can supply a crafted parameter value that causes the server to execute attacker-controlled OS commands at the privilege level of the EPMM service account (typically <code>root</code> or a high-privilege service identity on the underlying Linux host).</p>
<p><strong>Chain mechanics (step-by-step)</strong></p>
<pre><code>1. Attacker identifies internet-facing EPMM port 443 (admin/MDM API)
2. Sends crafted Sentry registration request → CVE-2026-5787
3. EPMM issues valid CA-signed client certificate (Sentry trust level)
4. Attacker presents certificate to EPMM admin REST API → authenticated as admin
5. Injects OS command payload into vulnerable admin API parameter → CVE-2026-6973
6. Arbitrary OS command execution on EPMM host as service account
Post-exploitation paths:
  ├── Extract SCEP/NDES CA private key material from EPMM keystore
  ├── Enrol attacker-controlled device to gain persistent MDM trust
  ├── Push malicious MDM profile / app to enrolled device fleet
  └── Pivot to backend services via Sentry certificate trust</code></pre>
<p>The combined chain converts a nominal &quot;requires admin authentication&quot; RCE into a fully pre-authenticated exploit — the reason CISA listed the vulnerability in KEV with a two-day remediation deadline despite the individual CVE scores.</p>
<p><strong>Exploitation context and historical precedent</strong></p>
<p>At disclosure (2026-05-07), Ivanti reported &quot;very limited exploitation&quot; of CVE-2026-6973. CISA&#39;s simultaneous KEV listing confirms verified in-the-wild exploitation. Historical precedent for Ivanti EPMM is instructive: CVE-2023-35078 (pre-auth API access, July 2023) was exploited by APT29 and LAPSUS-adjacent actors within days of disclosure, targeting European government MDM servers. CVE-2025-0283 (January 2025) followed a similar pattern. The security community should treat &quot;very limited&quot; as reflecting disclosure-moment telemetry, not steady-state exploitation activity; public PoC availability will accelerate exploitation.</p>
<p><strong>MITRE ATT&amp;CK mapping</strong></p>
<div class="table-wrap"><table>
<thead><tr>
<th style="text-align:left">Technique</th>
<th style="text-align:left">ID</th>
<th style="text-align:left">Application</th>
</tr></thead><tbody>
<tr>
<td style="text-align:left">Exploit Public-Facing Application</td>
<td style="text-align:left">T1190</td>
<td style="text-align:left">Direct exploitation of internet-exposed EPMM</td>
</tr>
<tr>
<td style="text-align:left">Valid Accounts</td>
<td style="text-align:left">T1078</td>
<td style="text-align:left">CA-signed cert provides admin-equivalent session</td>
</tr>
<tr>
<td style="text-align:left">Command and Scripting Interpreter</td>
<td style="text-align:left">T1059</td>
<td style="text-align:left">OS command execution via unsanitised API input</td>
</tr>
<tr>
<td style="text-align:left">Compromise Infrastructure: Certificate Authorities</td>
<td style="text-align:left">T1584.007</td>
<td style="text-align:left">Post-exploit extraction of EPMM internal CA material</td>
</tr>
<tr>
<td style="text-align:left">Remote Device Management</td>
<td style="text-align:left">T1072</td>
<td style="text-align:left">MDM push to enrolled device fleet post-compromise</td>
</tr>
<tr>
<td style="text-align:left">Steal Application Access Token</td>
<td style="text-align:left">T1528</td>
<td style="text-align:left">Extraction of device enrolment certificates</td>
</tr>
</tbody></table></div>
<p><strong>Detection opportunities</strong></p>
<ul><li><strong>EPMM audit log</strong> (<code>/var/log/mi*</code>): unexpected Sentry host registration events with unknown <code>host_id</code> values or registration from IP addresses outside known Sentry appliance inventory</li><li><strong>Syslog / process audit</strong> on the EPMM host: EPMM service account spawning unexpected child processes (<code>sh</code>, <code>bash</code>, <code>curl</code>, <code>wget</code>) or accessing non-standard file paths</li><li><strong>Network telemetry</strong>: outbound connections from EPMM host to non-Ivanti, non-MDM-infrastructure IPs shortly after a certificate issuance event</li><li><strong>EDR on EPMM host</strong> (if deployed): process ancestry anomalies under the EPMM service account</li><li><strong>MDM enrolment audit</strong>: new device enrolment events from unrecognised device identifiers or IPs not in the corporate mobile device fleet</li></ul>
<p><strong>Immediate defensive steps (priority order)</strong></p>
<ol><li><strong>Patch now</strong> — upgrade to EPMM 12.6.1.1, 12.7.0.1, or 12.8.0.1 before 2026-05-10. Ivanti provides an in-place upgrade path; no configuration migration is required.</li><li><strong>Network isolation (if patching is delayed)</strong> — remove TCP 443 on the EPMM admin interface from internet exposure immediately. Place it behind VPN with allowlisted management-network source IPs.</li><li><strong>Audit Sentry registrations</strong> — in the EPMM admin console, review the registered Sentry host list. Revoke any unexpected entries. If suspicious entries are found, rotate the internal EPMM CA (this revokes all existing device certificates and requires re-enrolment — a significant operational step, but necessary if compromise is suspected).</li><li><strong>Audit enrolled device certificates</strong> — compare current enrolled device list against your asset inventory baseline. Anomalous device enrolments (unknown device ID, unusual user, unexpected enrolment date) may indicate post-exploitation persistence.</li><li><strong>MDM quarantine isolation</strong> — if active compromise is confirmed or strongly suspected, push an MDM quarantine compliance policy to all enrolled devices before beginning forensic investigation, to prevent attacker MDM-to-device lateral movement during the response window.</li></ol><aside class="item-footer"><span class="meta-sources"><strong>Sources:</strong> <a class="src-primary" href="https://www.ivanti.com/blog/may-2026-epmm-security-update" target="_blank" rel="noopener noreferrer">Ivanti — May 2026 EPMM Security Update</a> · <a class="src-additional" href="https://nvd.nist.gov/vuln/detail/CVE-2026-5787" target="_blank" rel="noopener noreferrer">NVD — CVE-2026-5787</a> · <a class="src-additional" href="https://nvd.nist.gov/vuln/detail/CVE-2026-6973" target="_blank" rel="noopener noreferrer">NVD — CVE-2026-6973</a> · <a class="src-additional" href="https://thehackernews.com/2026/05/ivanti-epmm-cve-2026-6973-rce-under.html" target="_blank" rel="noopener noreferrer">The Hacker News — Ivanti EPMM CVE-2026-6973 Under Active Exploitation</a></span></aside>]]></content:encoded></item></channel></rss>