Single Threat Actor Drives 83% of Ivanti EPMM RCE Exploits


One threat actor caused 83% of recent attacks on Ivanti Endpoint Manager Mobile. They exploited CVE-2026-21962 and CVE-2026-24061 for unauthenticated remote code execution. GreyNoise tracked 417 sessions from February 1-9, 2026, mostly from IP 193.24.123.42 on bulletproof hosting.

The IP belongs to PROSPERO OOO AS200593. It hit a spike of 269 sessions on February 8, 13 times the average. 85% used OAST DNS callbacks for access checks, like initial brokers do. Automation rotated 300 user agents across browsers and OSes

.

Source -GreyNoise

This actor also scanned Oracle WebLogic (CVE-2026-21962, 2,902 sessions), GNU Telnetd (CVE-2026-24061, 497 sessions), and GLPI (CVE-2025-24799). Published IOCs miss this main source.

Source – GreyNoise

GreyNoise reports: “Exploitation is accelerating. 269 sessions on February 8 alone, up from a daily average of 21. Defenders with unpatched, internet-facing EPMM instances should assume they have been scanned.”

Ivanti spokesperson: “Customers who have not yet patched should do so immediately… The patch requires no downtime and takes only seconds to apply.”

Exploitation Stats

VulnerabilitySessions% of TotalNotes
Ivanti EPMM (CVE-2026-21962/24061)417 (83% from 1 IP)High354 OAST callbacks
Oracle WebLogic (CVE-2026-21962)2,902DominantSame actor
GNU Telnetd (CVE-2026-24061)497MediumAutomated
GLPI (CVE-2025-24799)200LowMulti-target ​

Attack Patterns

8 unique IPs total. Bulletproof AS hides the main one. No downtime patches available now. Full fix in EPMM 12.8.0.0 Q1 2026. Use RPM 12.x.0.x/12.x.1.x meantime.

Ivanti urges rebuild/migration for safety. CISA lists CVE-2026-1281 as exploited.

Defense Steps

  • Apply RPM hotfixes now.
  • Hunt OAST callbacks in DNS logs.
  • Block 193.24.123.42 and PROSPERO IPs.
  • Review for code execution signs.
ActionUrgencyResource
Patch RPMImmediateIvanti hub
IOC ScanHighGreyNoise SITREP
Rebuild EPMMConservativeForums guide
Log ReviewOngoingDNS/traffic​

FAQ

Which actor hit Ivanti hardest?

Single IP 193.24.123.42 caused 83% of 417 sessions.

What vulns exploited?

CVE-2026-21962, CVE-2026-24061 in EPMM.

Patch status?

Hotfixes out; full in 12.8.0.0 Q1 2026.

Signs of compromise?

OAST DNS callbacks, command tests.

Other targets?

WebLogic, Telnetd, GLPI by same actor.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages