Overview
Ivanti has released security updates to address several high-severity vulnerabilities in Endpoint Manager Mobile (EPMM) one of which has had limited active exploitation in the wild. If exploited successfully, an authenticated attacker could take complete administrative control of the impacted EPMM environments, which could result in the compromise of managed mobile devices and remote code execution.
- CVE‑2026‑6973: Improper Input Validation in Ivanti EPMM (CVSSv3 7.2)
- CVE‑2026‑5786: Improper Access Control Vulnerability in Ivanti EPMM (CVSSv3 8.8)
Apache has released a security update to address a high‑severity vulnerability in Apache HTTP Server. If exploited successfully, an unauthenticated remote attacker could achieve remote code execution or crash the service.
- CVE‑2026‑23918: Double Free Vulnerability in Apache HTTP Server with the HTTP/2 Protocol (CVSSv3 8.8)
Note: For this vulnerability to affect an Apache HTTP Server installation, the HTTP/2 protocol must be enabled.
Palo Alto Networks has released a security advisory to address a critical vulnerability in the User-IDTM Authentication Portal (aka Captive Portal) service of Palo Alto Networks PAN-OS software. By sending specially crafted packets, a remote unauthenticated attacker could successfully exploit the PA-Series and VM-Series firewalls and run arbitrary code with root privileges.
- CVE-2026-0300: Buffer Overflow Vulnerability in User-IDTM Authentication Portal (CVSSv4 9.3)
Recommended Action
Organisations are encouraged to review the appropriate security advisory pages and apply the updates:
Ivanti - May 2026 Security Advisory Ivanti Endpoint Manager Mobile (EPMM)
Apache - Apache HTTP Server 2.4 vulnerabilities - The Apache HTTP Server Project
If you have any concerns, or have been affected by a cyber-related issue, report it to us by submitting a Cyber Concerns Online Reporting Form.