MONDAY INTEL DROP | WEEKLY BRIEF
Active Threat12 min read

3 Critical Threats This Week: Ivanti EPMM Zero-Day, DAEMON Tools Supply Chain, Trellix Breach

CVSS 7.2
Severity of CVE-2026-6973 in Ivanti EPMM, the platform's third actively exploited zero-day in 2026, with the CISA federal patch deadline expired as of May 10
28 days
DAEMON Tools official signed installers distributed a QUIC RAT backdoor undetected before Kaspersky discovered the supply chain compromise on May 5, 2026
3.65 TB
Volume of data RansomHouse claims exfiltrated from Trellix source code repositories, with VMware and Dell EMC infrastructure potentially also accessed
3rd
Number of separate Ivanti EPMM zero-day exploitation events in 2026, following CVE-2026-1281 and CVE-2026-1340 in January, both exploited unauthenticated at CVSS 9.8

CISA's emergency patch deadline for CVE-2026-6973, Ivanti's third actively exploited Endpoint Manager Mobile zero-day in 2026, expired May 10, leaving organizations running unpatched on-premises EPMM servers exposed to confirmed active exploitation.

**Ivanti EPMM zero-day CVE-2026-6973** is an improper input validation flaw (CWE-20) in the mobile device management platform that enterprises and government agencies use to manage employee devices, enforce security policies, and distribute corporate applications. An attacker holding valid EPMM admin credentials can submit a crafted request to a vulnerable API endpoint, triggering arbitrary OS command execution on the server. CISA confirmed limited targeted exploitation and added the vulnerability to the Known Exploited Vulnerabilities catalog on May 8, the same day Ivanti published its advisory, then issued an emergency directive giving federal agencies three business days to patch. That deadline passed yesterday.

The CVE-2026-6973 post-authentication requirement does not reduce risk as much as it appears. Ivanti EPMM has now recorded three separately exploited zero-days in five months: CVE-2026-1281 and CVE-2026-1340 in January provided unauthenticated access at CVSS 9.8. Any admin credential not rotated since January, reused across services, accessible via phishable MFA, or in continuous use for more than 90 days represents a viable exploitation prerequisite today.

Two additional threats complete this week's picture. Kaspersky disclosed on May 5 that official DAEMON Tools Lite installers were backdoored with a QUIC RAT for 28 consecutive days using signed binaries from the official download page. Separately, RansomHouse claimed a breach of Trellix, the enterprise cybersecurity vendor, with 3.65 TB of alleged source code exfiltrated and independent researchers warning that VMware and Dell EMC infrastructure may also be involved. Three supply chain and vendor integrity events in a single week require a coordinated response across patch management, software inventory, and vendor monitoring.

Free daily briefing

Briefings like this, every morning before 9am.

Threat intel, active CVEs, and campaign alerts — distilled for practitioners. 50,000+ subscribers. No noise.

How Does CVE-2026-6973 in Ivanti EPMM Work?

**CVE-2026-6973** is classified under CWE-20 (Improper Input Validation) and resides in an administrative API endpoint within the Ivanti Endpoint Manager Mobile on-premises server. The vulnerable endpoint processes user-supplied input without adequate sanitization. An attacker with valid admin-level credentials submits a crafted request to trigger OS command execution in the context of the EPMM service account.

The attack path starts with credential access to the EPMM admin console. Unlike the January 2026 EPMM vulnerabilities CVE-2026-1281 and CVE-2026-1340, which allowed unauthenticated access, CVE-2026-6973 requires authenticated access. For an MDM platform managing mobile device enrollment, policy enforcement, and application distribution across an entire corporate fleet, admin credential access is a lower bar than it appears: any prior credential compromise, password reuse, phishing of an IT administrator, or reuse of credentials exposed in the January 2026 incident creates a viable attack path.

Affected versions are all Ivanti EPMM on-premises deployments at or before version 12.8.0.0. Patched versions are 12.6.1.1, 12.7.0.1, and 12.8.0.1. Ivanti Neurons for MDM, the cloud-hosted product, is not affected by this vulnerability.

Related CVEs in this advisory release include CVE-2026-5786, CVE-2026-5787, CVE-2026-5788, and CVE-2026-7821, which address additional validation and authentication issues in EPMM and adjacent components. Ivanti's full advisory covers the complete fix manifest. SecurityWeek notes that organizations that rotated admin credentials after the January 2026 EPMM advisory face "significantly reduced" risk for CVE-2026-6973, but Ivanti and CISA both characterize this as non-eliminated risk requiring patch application regardless of prior credential hygiene actions.

CISA Emergency Directive: The May 10 Federal Deadline Has Passed

CISA added CVE-2026-6973 to the Known Exploited Vulnerabilities catalog on May 8, 2026, the same day Ivanti published its advisory. On the same day, CISA issued an emergency directive ordering all Federal Civilian Executive Branch agencies to apply patches or implement compensating controls within three business days, placing the compliance deadline at May 10, 2026. That deadline expired yesterday.

The three-day window reflects CISA's assessment of active exploitation severity and the sensitivity of what EPMM manages. A compromised MDM server provides the ability to push malicious profiles to all enrolled devices, extract certificates and enrollment credentials, access corporate application data stored on managed devices, and monitor device locations. SecurityWeek's reporting characterizes exploitation as "limited targeted attacks," the phrase CISA uses when evidence points to specific identified targets rather than opportunistic mass scanning.

The targeting profile is consistent with the January 2026 EPMM incidents, which attribution analysis linked to a suspected nation-state cluster focused on defense, government, and critical infrastructure organizations using Ivanti EPMM for mobile device management. Three exploitation events against the same platform in five months indicates sustained adversary investment in finding and exploiting EPMM vulnerabilities, not opportunistic opportunism.

For private sector organizations not subject to CISA emergency directives, the KEV designation provides the same operational signal: exploitation is confirmed, attack tooling is deployed, and unpatched systems are active targets. Apply Ivanti's patch as an emergency deployment regardless of regulatory obligations. After patching, rotate all EPMM admin account credentials and audit the admin user list for unauthorized additions made during any window of active exploitation.

CISA has evidence that this vulnerability is being exploited in limited targeted attacks. Federal agencies are required to remediate this known exploited vulnerability by the due date.

CISA Known Exploited Vulnerabilities Catalog, CVE-2026-6973 entry, May 8, 2026

How Did the DAEMON Tools Supply Chain Attack Deliver a QUIC RAT for 28 Days?

Official DAEMON Tools Lite installers downloaded from the product's primary website between approximately April 8 and May 5, 2026 contained a trojanized QUIC RAT, a remote access trojan delivered over the QUIC protocol. Kaspersky researchers discovered the compromise on May 5 and attributed the attack to a suspected Chinese-speaking threat actor based on TTPs and tooling similarities to documented China-nexus groups.

The attack modified three binaries within the installer package while preserving their valid digital signatures: DTHelper.exe, DiscSoftBusServiceLite.exe, and DTShellHlp.exe. On execution, these components made HTTP GET requests to env-check.daemontools[.]cc, a C2 domain registered on March 27, 2026, approximately 12 days before the campaign began. The C2 interaction delivered two initial payloads: envchk.exe, a system information collector, and cdg.exe, a shellcode loader. The QUIC RAT itself was delivered selectively, not to every system that installed the backdoored version, but to operator-chosen targets identified through the information collector.

This selective delivery mechanism is the most operationally significant aspect of the attack. Compromised systems sent hardware and software profile data to the C2, and operators decided which systems to activate with the full RAT based on assessed target value. Organizations that installed affected DAEMON Tools versions during the 28-day window cannot assume they were not RAT targets simply because they have not observed active C2 communication. Absence of visible C2 traffic is not absence of compromise.

All organizations that installed DAEMON Tools Lite versions 12.5.0.2421 through 12.5.0.2434 should treat those systems as potentially compromised and conduct forensic review. The safe version is 12.6.0.2445 or later. Block env-check.daemontools[.]cc at every DNS resolver and proxy layer immediately. This is not the first 2026 supply chain attack via signed software from a legitimate vendor distribution channel — for context on the scale of supply chain compromise risk this year, see the [North Korea supply chain attack deploying malware across 1,700 packages](/blog/north-korea-supply-chain-1700-packages).

Subscribe to unlock Indicators of Compromise

Free subscribers unlock full IOC lists, remediation steps, and every daily briefing.

What Did RansomHouse Steal from Trellix and Why It Matters for Enterprise Security

RansomHouse, an extortion group that exfiltrates data without deploying encryption, listed Trellix on its data leak site on May 7, 2026, claiming initial access dated April 17 and providing leaked screenshots as proof of compromise. Trellix, the enterprise cybersecurity vendor formed from the 2022 merger of McAfee Enterprise and FireEye, confirmed on May 1 that it "detected unauthorized access to a portion of its source code repository."

Trellix's statement draws a careful distinction: the company states no evidence exists that source code was exploited, that distribution pipelines were compromised, or that deployed Trellix products were modified. Independent security researchers reviewing leaked material assessed that VMware, Rubrik, and Dell EMC infrastructure may also have been accessed during the intrusion, significantly widening the potential blast radius beyond Trellix source code alone. The initial access vector used by RansomHouse has not been publicly confirmed.

The security significance of a cybersecurity vendor source code breach differs from most corporate incidents. Trellix develops endpoint detection and response (EDR), extended detection and response (XDR), and network security products deployed across thousands of enterprise environments. Attackers with visibility into Trellix source code can map detection signatures and rule logic to identify bypass opportunities, identify memory layout patterns in Trellix agents that facilitate process injection, find authentication or update mechanisms usable for future product tampering, and understand telemetry collection to design evasion that avoids specific data points Trellix forwards to SIEM platforms.

None of these scenarios require action visible in a breach announcement. The risk manifests over a months-long window as RansomHouse develops capabilities against Trellix products directly or sells that access to other threat actors. Organizations running Trellix EDR, Helix SIEM, or network security products should monitor Trellix advisories with elevated priority and treat any emergency product updates in the coming weeks as security-critical deployments.

We detected unauthorized access to a portion of our source code repository. We have no evidence that the source code was exploited or that our product distribution pipeline was compromised.

Trellix official statement, May 1, 2026

Patch Tuesday May 12 and PAN-OS Patches: What Arrives Tomorrow

Two major patch events land tomorrow, May 12, 2026. Microsoft's monthly Patch Tuesday release is scheduled as normal. Based on 2026 release patterns — 115 CVEs in January, 58 in February, 84 in March, and 167 in April — May's update is expected to be a substantial release. Security teams should prioritize any zero-day patches and CISA KEV-related fixes, particularly for Windows components given the two still-unpatched Microsoft Defender zero-days, RedSun and UnDefend, that remain actively exploited with no vendor patch yet available.

Palo Alto Networks confirmed that fixes for CVE-2026-0300, the critical PAN-OS zero-day with a CVSS score of 9.3, are expected to begin shipping May 13. CVE-2026-0300 is an unauthenticated root-level RCE vulnerability in PAN-OS's User-ID Authentication Portal that a suspected China-nexus threat actor exploited for 28 days before public disclosure on May 6. The federal patch deadline for CVE-2026-0300 was May 9. No patch was available at deadline. For full technical detail and immediate mitigations including Authentication Portal disabling steps, see the [CVE-2026-0300 PAN-OS zero-day mitigation guide](/blog/cve-2026-0300-panos-firewall-rce-mitigation).

Organizations should prepare deployment pipelines for both releases today. Stage test environments for Windows patch validation before Patch Tuesday fires. Pre-position PAN-OS maintenance windows for May 13-14 when firewall patches release and ensure emergency change management approvals are pre-authorized given the critical severity. The combination of CVE-2026-6973 requiring immediate action now, CVE-2026-0300 patches arriving tomorrow, and the unpatched Windows Defender zero-days makes May 11-13 one of the most demanding consecutive patching windows of 2026.

Why Ivanti EPMM Zero-Day CVE-2026-6973 Matters for Your Organization

Three separate Ivanti EPMM zero-day exploitation events in five months indicate sustained focus on the platform by sophisticated threat actors. The pattern suggests either active vulnerability research against EPMM by organized groups, or that initial EPMM compromises from January have provided footholds that attackers are now expanding through newly discovered post-authentication vectors. Neither interpretation reduces urgency.

The post-authentication requirement for CVE-2026-6973 is a deceptive risk reduction. EPMM admin accounts that share passwords with other services, were not rotated after the January 2026 advisory, are accessible via phishable MFA, or have been in continuous use for more than 90 days without rotation all represent viable exploitation prerequisites. The January 2026 incidents involved organizations that considered themselves low-risk. Three events later, no EPMM deployment should carry that assumption.

The DAEMON Tools supply chain attack demonstrates that software with legitimate digital signatures cannot be treated as implicitly trustworthy. The same principle applies to any software using automated update mechanisms, installer distribution through vendor-hosted channels, or deployment via package managers without hash verification. An SBOM practice with hash validation against known-good installer records provides the verification layer that code-signing alone no longer guarantees.

RansomHouse targeting Trellix establishes that cybersecurity vendors are now high-value breach targets not for ransomware deployment but for the strategic intelligence value of source code, detection logic, and product architecture. Security teams should evaluate their defensive posture under the assumption that sophisticated threat actors may have unusual knowledge of how some deployed security tooling functions internally.

This Week's Remediation Checklist: Ivanti EPMM, DAEMON Tools, and Trellix

Execute these actions in priority order. Steps 1 and 2 address confirmed active exploitation with expired federal deadlines.

Subscribe to unlock Remediation & Mitigation steps

Free subscribers unlock full IOC lists, remediation steps, and every daily briefing.

The bottom line

Ivanti EPMM zero-day CVE-2026-6973 is the third actively exploited EPMM vulnerability in 2026 and the CISA emergency deadline has already passed: patch to 12.6.1.1, 12.7.0.1, or 12.8.0.1 and rotate admin credentials before anything else today. Organizations that installed DAEMON Tools Lite between April 8 and May 5 should treat those systems as potentially compromised and block env-check.daemontools[.]cc at every network layer immediately. Patch Tuesday May 12 and PAN-OS CVE-2026-0300 patches on May 13 make this week's deployment window one of the year's most demanding — stage environments and pre-authorize change windows now.

Frequently asked questions

What is CVE-2026-6973 in Ivanti EPMM?

CVE-2026-6973 is a high-severity remote code execution vulnerability in Ivanti Endpoint Manager Mobile (EPMM), an on-premises mobile device management platform used by enterprises and government agencies. The flaw stems from improper input validation and is exploitable by an authenticated attacker holding valid admin credentials, allowing arbitrary command execution on the server. CVSS score is 7.2. This is the third separate EPMM zero-day exploitation event in 2026, following CVE-2026-1281 and CVE-2026-1340 in January, which were unauthenticated with CVSS scores reaching 9.8.

Which versions of Ivanti EPMM are affected by CVE-2026-6973?

All Ivanti EPMM on-premises versions up to and including 12.8.0.0 are affected by CVE-2026-6973. Patched versions are 12.6.1.1, 12.7.0.1, and 12.8.0.1. Ivanti Neurons for MDM, the cloud-hosted product, is not affected. Organizations that already rotated admin credentials following the January 2026 EPMM advisories face significantly reduced risk, but Ivanti and CISA both treat this as non-eliminated risk requiring immediate patch application regardless.

Is CVE-2026-6973 being actively exploited right now?

Yes. CISA confirmed limited targeted exploitation of CVE-2026-6973 and added it to the Known Exploited Vulnerabilities catalog on May 8, 2026. CISA issued an emergency directive requiring federal agencies to patch within three business days, with a deadline of May 10, 2026. That deadline has now passed. SecurityWeek reported exploitation in targeted attacks consistent with nation-state or advanced threat actor activity, requiring valid admin-level credentials as a prerequisite, suggesting attackers already held elevated access to targeted EPMM deployments.

How do I patch Ivanti Endpoint Manager Mobile CVE-2026-6973?

Apply one of the patched versions immediately: EPMM 12.6.1.1, 12.7.0.1, or 12.8.0.1 depending on your current version track. After patching, rotate all admin credentials for the EPMM console, review the admin account list for unauthorized additions, and audit EPMM logs for unusual API calls or configuration changes in the past 30 days. If your organization rotated credentials following the January 2026 EPMM advisories, that prior rotation reduces but does not eliminate risk from CVE-2026-6973.

Is Ivanti EPMM cloud affected by CVE-2026-6973?

No. CVE-2026-6973 affects Ivanti Endpoint Manager Mobile on-premises deployments only. Ivanti Neurons for MDM, the cloud-hosted product, is not affected by this vulnerability. Organizations that have fully migrated to Ivanti Neurons for MDM do not need to take action for this specific CVE. On-premises EPMM administrators should apply the patch regardless of whether their deployment is externally accessible, since insider threat or compromised admin credentials remain viable exploitation paths.

How were official DAEMON Tools installers backdoored for 28 days without detection?

Kaspersky found that DAEMON Tools Lite versions 12.5.0.2421 through 12.5.0.2434, downloaded from the official website between approximately April 8 and May 5, 2026, contained a trojanized QUIC RAT delivered via three modified signed binaries: DTHelper.exe, DiscSoftBusServiceLite.exe, and DTShellHlp.exe. The binaries retained valid digital signatures, passing standard code-signing validation. On execution they contacted a newly registered C2 domain and selectively delivered a remote access trojan to chosen targets based on a system profiling step. The attack is attributed to a suspected Chinese-speaking adversary.

Is Trellix security software safe to use after the RansomHouse breach?

Trellix states no evidence exists that source code was weaponized or that distribution pipelines were compromised. However, independent researchers reviewing leaked material believe VMware, Rubrik, and Dell EMC infrastructure may also have been accessed, extending potential exposure beyond source code alone. The primary risk is not immediate software backdooring but a longer-term window during which attackers may map Trellix detection logic, identify bypass opportunities, or develop evasion capabilities. Security teams running Trellix XDR, endpoint, or network products should monitor Trellix advisories with elevated priority.

What is Patch Tuesday May 12 2026 expected to cover?

Microsoft's May 2026 Patch Tuesday releases on May 12. Based on 2026 patterns (115 CVEs in January, 58 in February, 84 in March, 167 in April), May is expected to include a substantial update. Security teams should prioritize any zero-day fixes, particularly for the two still-unpatched Microsoft Defender zero-days RedSun and UnDefend that remain actively exploited. Separately, Palo Alto Networks confirmed that patches for CVE-2026-0300, the critical PAN-OS CVSS 9.3 zero-day actively exploited since April 9 by a China-nexus actor, are expected to begin shipping May 13.

Sources & references

  1. The Hacker News — Ivanti EPMM CVE-2026-6973 RCE Under Active Attack
  2. BleepingComputer — CISA Gives Feds Four Days to Patch Ivanti Flaw Exploited as Zero-Day
  3. SecurityWeek — Ivanti Patches EPMM Zero-Day Exploited in Targeted Attacks
  4. The Hacker News — DAEMON Tools Supply Chain Attack: Trojanized Installers Drop QUIC RAT
  5. BleepingComputer — Trellix Source Code Breach Claimed by RansomHouse Hackers
  6. CISA — Known Exploited Vulnerabilities Catalog

Free resources

25
Free download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.

No spam. Unsubscribe anytime.

Free download

Ransomware Incident Response Playbook

Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

Daily Briefing

Get briefings like this every morning

Actionable threat intelligence for working practitioners. Free. No spam. Trusted by 50,000+ SOC analysts, CISOs, and security engineers.

Unsubscribe anytime.

Get tomorrow's threat briefing before your inbox does.