Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Microsoft Patch Tuesday May 2026: Vulnerabilities Fixed
May 12, 2026
Critical Fortinet FortiSandbox Flaw Allows Vulnerability Enables
May 12, 2026
Fortinet Patches Five Vulnerabilities in Forti Across FortiAP
May 12, 2026
Home/CyberSecurity News/Ivanti Patches Critical Vulnerabilities in Secure Access &
CyberSecurity News

Ivanti Patches Critical Vulnerabilities in Secure Access &

Ivanti has released its May 2026 Patch Tuesday security updates, disclosing vulnerabilities across four products. Significantly, the company also revealed that artificial intelligence tools are...

Marcus Rodriguez
Marcus Rodriguez
May 12, 2026 3 Min Read
2 0

Ivanti has released its May 2026 Patch Tuesday security updates, disclosing vulnerabilities across four products. Significantly, the company also revealed that artificial intelligence tools are already aiding its engineers in uncovering flaws that traditional scanners often miss. This AI-driven discovery, Ivanti cautioned, is expected to accelerate future disclosure volumes.

Table Of Content

  • Ivanti Patches Multiple Vulnerabilities
  • Ivanti Secure Access Client
  • CVE-2026-7431 — Sensitive Log Data Exposure
  • CVE-2026-7432 Local Privilege Escalation to SYSTEM
  • Ivanti Xtraction
  • CVE-2026-8043 — Path Traversal & Arbitrary File Write
  • Ivanti Virtual Traffic Manager (vTM)
  • CVE-2026-8051 — OS Command Injection
  • Ivanti Endpoint Manager
  • CVE-2026-8109 — Credential Leakage
  • CVE-2026-8110 — Agent Privilege Escalation
  • CVE-2026-8111 — SQL Injection Leading to RCE

Ivanti Patches Multiple Vulnerabilities

The company addressed vulnerabilities in four distinct products on May 13, 2026:

  • Ivanti Secure Access Client — CVE-2026-7431 and CVE-2026-7432
  • Ivanti Xtraction — CVE-2026-8043
  • Ivanti Virtual Traffic Manager (vTM) — CVE-2026-8051
  • Ivanti Endpoint Manager (EPM) — CVE-2026-8109, CVE-2026-8110, CVE-2026-811

Ivanti confirmed that none of these vulnerabilities have been exploited in the wild and that they do not affect any other Ivanti solutions.

Ivanti Secure Access Client

CVE-2026-7431 — Sensitive Log Data Exposure

A flaw in Ivanti Secure Access Client before 22.8R6 stems from incorrect permission assignment (CWE-732) on a shared memory section.

A local authenticated attacker can read or modify sensitive log data. The attack is local-only and requires no user interaction, limiting its blast radius but posing a real risk in multi-user or shared endpoint environments.

CVE-2026-7432 Local Privilege Escalation to SYSTEM

A race condition (CWE-362) in Ivanti Secure Access Client before 22.8R6 lets a locally authenticated attacker win a timing window to escalate privileges to SYSTEM.

With full confidentiality, integrity, and availability impact, this is a classic LPE flaw that threat actors frequently chain with initial access exploits to achieve full machine takeover.

Ivanti Xtraction

CVE-2026-8043 — Path Traversal & Arbitrary File Write

The most severe vulnerability in this advisory batch affects Ivanti Xtraction before version 2026.2.

Classified under CWE-22 (Path Traversal) and CWE-73 (External Control of File Name), a remote authenticated attacker can read sensitive server-side files and write arbitrary HTML to the web directory, enabling stored cross-site scripting or web shell staging.

Ivanti Virtual Traffic Manager (vTM)

CVE-2026-8051 — OS Command Injection

An OS command injection flaw (CWE-78) in the Ivanti Virtual Traffic Manager before 22.9r4 admin interface.

A remote attacker with admin credentials can inject OS-level commands to achieve full remote code execution on the appliance.

While admin privileges are required (PR: H), vTM sits at a critical network chokepoint, making compromise of this device catastrophic for traffic routing and inspection.

Ivanti Endpoint Manager

CVE-2026-8109 — Credential Leakage

An exposed dangerous method (CWE-749) on the Ivanti Endpoint Manager Core Server before 2024 SU6 allows a remote authenticated attacker to exfiltrate access credentials from the server.

With a high confidentiality impact and no integrity or availability effect, this is a credential harvesting vector that could enable lateral movement or privilege escalation across managed endpoints.

CVE-2026-8110 — Agent Privilege Escalation

Incorrect permissions assignment (CWE-732) in the Ivanti EPM agent before 2024 SU6 allows a local authenticated attacker to escalate privileges on the endpoint.

Mirroring CVE-2026-7432 in attack pattern, this flaw is particularly dangerous in enterprise environments where EPM agents are deployed broadly across thousands of managed devices.

CVE-2026-8111 — SQL Injection Leading to RCE

A SQL injection vulnerability (CWE-89) in the Ivanti EPM web console before 2024 SU6 allows any remote authenticated attacker to achieve remote code execution — no admin rights required (PR:L).

This is the most dangerous network-facing EPM flaw in the batch; SQL injection-to-RCE chains in web consoles are well-documented, easy to weaponize, and frequently targeted by ransomware operators and nation-state actors alike.

Ivanti disclosed that its security team has integrated multiple large language models (LLMs) into its Engineering and Product Security Red Team workflows in recent months.

According to the company, these AI tools are proving effective at identifying vulnerability classes that traditional static and dynamic analysis tools, SAST and DAST, routinely miss.

Ivanti confirmed that several of the vulnerabilities disclosed today were discovered directly through AI-assisted review rather than conventional tooling.

The company acknowledged a pointed reality facing the entire industry: AI is compressing the time-to-exploit. Threat actors are leveraging automation and machine learning to weaponize newly disclosed flaws faster than ever before.

Ivanti’s answer is to use the same technology category offensively within its own red teams, finding and fixing issues before attackers can weaponize them.

Security teams running any of the four affected products should prioritize patching immediately, even in the absence of active exploitation.

Given Ivanti’s history as a high-value target for nation-state and ransomware threat actors, unpatched instances carry outsized risk.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchransomwareSecurityThreatVulnerability

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

Open WebUI File Upload Vulnerability Allows 1 Leads Attack

Next Post

Top MSSPs Prevent Incidents with Live Threat Visibility

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Open WebUI File Upload Vulnerability Allows 1 Leads Attack
May 12, 2026
SAP Patches Critical SQL Injection Flaw in S/4 Vulnerability S/4HANA
May 12, 2026
Zoom Rooms Vulnerabilities Allow Attackers to Escalate
May 12, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us