Site icon Secy247 – Technology, Cybersecurity & Business

Ivanti EPMM Zero-Day Exploited: Patch Now for CVE-2026-1281 and CVE-2026-1340

Ivanti has released emergency security updates for two critical vulnerabilities affecting Ivanti Endpoint Manager Mobile (EPMM) after confirming the flaws have been exploited in real-world zero-day attacks.

One of the vulnerabilities has also been added to the CISA Known Exploited Vulnerabilities (KEV) catalog, increasing urgency for organizations that rely on Ivanti EPMM to manage enterprise mobile devices.


What’s Vulnerable

Ivanti disclosed two critical code injection flaws, both rated CVSS 9.8, which can allow unauthenticated remote code execution (RCE) — meaning attackers can potentially run commands on the appliance without valid login credentials.

The vulnerabilities are:

Ivanti said the issues specifically impact features tied to:

The company also clarified that these flaws do not impact other Ivanti products such as:


Affected Versions

According to Ivanti, multiple EPMM versions are affected, including:

Ivanti released interim fixes through RPM updates:

Important note for admins

Ivanti warned that the RPM patch does not carry over during version upgrades, meaning if you upgrade your appliance to a newer version, you must reapply the RPM fix.

Ivanti plans to permanently resolve the issues in EPMM 12.8.0.0, expected later in Q1 2026.


Real-World Exploitation Confirmed

Ivanti acknowledged that a small number of customers were exploited at the time of disclosure.

However, the company said it does not currently have enough consistent attacker behavior to publish “reliable atomic indicators,” meaning defenders may not have simple signatures or IOCs to detect activity immediately.


Why This Is Serious

Ivanti noted that successful exploitation gives the attacker arbitrary code execution on the appliance.

This is especially dangerous because EPMM appliances often sit at the center of mobile enterprise operations and may contain:

Ivanti also said previous EPMM attacks commonly used:

…to maintain persistence after exploitation.


How to Hunt for Exploitation

Ivanti recommends reviewing Apache access logs here:

/var/log/httpd/https-access_log

They also provided a detection regex pattern aimed at spotting suspicious exploitation attempts tied to the affected endpoints:

^(?!127\.0\.0\.1:\d+
.*$).*?\/mifs\/c\/(aft|app)store\/fob\/.*?404

What to look for

Ivanti explains that:


Additional Checks: Signs of Abuse

Ivanti advises customers to review EPMM settings closely for unusual or unauthorized changes, including:


If Compromised: What to Do

If evidence of compromise is found, Ivanti recommends rebuilding or restoring the appliance using a known-good backup, or replacing the appliance entirely, then migrating clean data.

After recovery, Ivanti urges organizations to lock things down by:


CISA KEV Deadline

CISA added CVE-2026-1281 to its Known Exploited Vulnerabilities catalog, requiring U.S. Federal Civilian Executive Branch (FCEB) agencies to patch by:

February 1, 2026

Even if you’re not a federal agency, a KEV listing is usually a strong sign that exploitation is active and scalable.

Exit mobile version