【資安漏洞預警】Ivanti Endpoint Manager存在高風險安全漏洞(CVE-2026-1603),請儘速確認並進行修補
[Security Vulnerability Alert] Ivanti Endpoint Manager has a high-risk security vulnerability (CVE-2026-1603). Please confirm and patch it as soon as possible.

發布單位:圖資處數位服務組
日期範圍:2026/3/13 ~ 2026/9/13
 
發布單位:圖資處數位服務組
日期範圍:2026/3/13 ~ 2026/9/13
行政 行政公告
全體

轉發 國家資安資訊分享與分析中心 資安訊息警訊 NISAC-200-202603-00000007

[內容說明]
研究人員發現Ivanti Endpoint Manager存在身分鑑別繞過(Authentication Bypass)漏洞(CVE-2026-1603),未經身分鑑別之遠端攻擊者可取得特定身分鑑別資料。該漏洞已遭駭客利用,請儘速確認並進行修補。

[影響平台]
Ivanti Endpoint Manager 2024 SU4 SR1(含)以前版本

[建議措施]
官方已針對漏洞釋出修復更新,請參考官方說明進行更新,網址如下: https://hub.ivanti.com/s/article/Security-Advisory-EPM-February-2026-for-EPM-2024?language=en_US

[參考資料]
1. https://nvd.nist.gov/vuln/detail/CVE-2026-1603
2. https://hub.ivanti.com/s/article/Security-Advisory-EPM-February-2026-for-EPM-2024?language=en_US

Forwarded from the National Cybersecurity Information Sharing and Analysis Center: Cybersecurity Alert NISAC-200-202603-00000007

[Content Description]
Researchers have discovered an authentication bypass vulnerability (CVE-2026-1603) in Ivanti Endpoint Manager. An unauthenticated remote attacker could obtain specific authentication information. This vulnerability has already been exploited by hackers. Please confirm and patch it as soon as possible.

[Affected Platforms]
Ivanti Endpoint Manager 2024 SU4 SR1 and earlier versions

[Recommended Actions]
The official patch has been released. Please refer to the official instructions to update. The URL is as follows: https://hub.ivanti.com/s/article/Security-Advisory-EPM-February-2026-for-EPM-2024?language=en_US

[References]
1. https://nvd.nist.gov/vuln/detail/CVE-2026-1603
2. https://hub.ivanti.com/s/article/Security-Advisory-EPM-February-2026-for-EPM-2024?language=en_US


相關附件
Top↑