Ivanti EPMM hit by two critical zero-days, with patches and risk guidance issued

Ivanti disclosed two critical RCE zero-day flaws in Endpoint Manager Mobile (CVE-2026-1281 and CVE-2026-1340) exploited in the wild at a limited number of customers. Both flaws score 9.8 and can run arbitrary code remotely without authentication. Ivanti released RPM-based mitigations for affected EPMM versions, noting no downtime is required but hotfixes must be reapplied after any version upgrade; a permanent fix arrives with EPMM 12.8.0.0 in Q1 2026. Exploitation can reveal administrator and user data, device details, and location (if enabled), and attackers could alter configurations via the API or web console. Defenders can detect activity via a specific Apache access-log regex, though logs can be altered by attackers. Recovery guidance includes restoring from a known-good backup or rebuilding, resetting local and service accounts' passwords, rotating certificates, and reviewing Sentry logs. CISA has added CVE-2026-1281 to KEV; federal agencies must patch or decommission affected systems by Feb 1, 2026.
- Ivanti warns of two EPMM flaws exploited in zero-day attacks BleepingComputer
- Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released The Hacker News
- Someone Knows Bash Far Too Well, And We Love It (Ivanti EPMM Pre-Auth RCEs CVE-2026-1281 & CVE-2026-1340) watchTowr Labs
- Ivanti: ‘Critical’ Mobile Management Vulnerabilities Seeing Exploitation CRN Magazine
- Update! Attacked vulnerability in Ivanti Endpoint Manager Mobile heise online
Reading Insights
1
9
4 min
vs 6 min read
86%
1,043 → 149 words
Want the full story? Read the original article
Read on BleepingComputer