Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1602: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Ivanti Endpoint Manager

0
Medium
VulnerabilityCVE-2026-1602cvecve-2026-1602cwe-89
Published: Tue Feb 10 2026 (02/10/2026, 15:07:27 UTC)
Source: CVE Database V5
Vendor/Project: Ivanti
Product: Endpoint Manager

Description

SQL injection in Ivanti Endpoint Manager before version 2024 SU5 allows a remote authenticated attacker to read arbitrary data from the database.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 07:48:57 UTC

Technical Analysis

CVE-2026-1602 is a SQL injection vulnerability identified in Ivanti Endpoint Manager versions before 2024 SU5. The root cause is improper neutralization of special elements used in SQL commands (CWE-89), which allows an authenticated remote attacker to manipulate SQL queries executed by the application. This manipulation enables the attacker to read arbitrary data from the underlying database, potentially exposing sensitive information such as user credentials, configuration details, or other critical enterprise data managed by the Endpoint Manager. The vulnerability requires the attacker to have valid authentication credentials, but no user interaction is needed beyond that. The attack vector is network-based, meaning exploitation can be performed remotely without physical access. The CVSS v3.1 base score is 6.5, reflecting a medium severity level primarily due to the confidentiality impact and the requirement for authentication. There are no known exploits in the wild at the time of publication, and no patch links were provided, indicating that organizations should monitor Ivanti advisories for updates. The vulnerability does not affect data integrity or system availability but poses a significant risk to data confidentiality. Ivanti Endpoint Manager is widely used in enterprise environments for endpoint management, making this vulnerability relevant to organizations relying on this product for IT asset and security management.

Potential Impact

The primary impact of CVE-2026-1602 is unauthorized disclosure of sensitive information stored in the Ivanti Endpoint Manager database. Attackers with valid credentials can exploit this vulnerability to extract confidential data, which may include user information, system configurations, or security policies. This data leakage can facilitate further attacks, such as privilege escalation, lateral movement, or targeted phishing campaigns. Although the vulnerability does not directly compromise data integrity or availability, the exposure of sensitive information can undermine organizational security posture and compliance with data protection regulations. Enterprises relying on Ivanti Endpoint Manager for endpoint security and management may face increased risk of data breaches and operational disruption if this vulnerability is exploited. The requirement for authentication limits the attack surface but does not eliminate risk, especially in environments where credential compromise or insider threats are possible. The absence of known exploits in the wild suggests limited immediate threat but does not preclude future exploitation attempts.

Mitigation Recommendations

Organizations should apply the official Ivanti Endpoint Manager patch for version 2024 SU5 or later as soon as it becomes available to remediate this SQL injection vulnerability. Until patched, restrict network access to the Endpoint Manager interface using firewalls and network segmentation to limit exposure to trusted administrators only. Implement strong authentication mechanisms, including multi-factor authentication, to reduce the risk of credential compromise. Regularly audit and monitor database queries and application logs for anomalous activity indicative of SQL injection attempts or unauthorized data access. Employ web application firewalls (WAFs) with rules tailored to detect and block SQL injection patterns targeting Ivanti Endpoint Manager. Conduct periodic security assessments and penetration testing focused on authentication and input validation controls within the Endpoint Manager environment. Educate administrators on secure credential management and the risks associated with SQL injection vulnerabilities. Maintain an up-to-date inventory of affected Ivanti products and versions to ensure timely patch management.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ivanti
Date Reserved
2026-01-29T09:18:47.171Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698b52ca4b57a58fa117f4f5

Added to database: 2/10/2026, 3:46:18 PM

Last enriched: 2/27/2026, 7:48:57 AM

Last updated: 4/6/2026, 4:56:01 PM

Views: 111

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses