Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released

Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released

Critical Zero-Day Flaws Hit Ivanti EPMM: Urgent Action Required

Ivanti has issued emergency patches for two critical vulnerabilities in its Endpoint Manager Mobile (EPMM) platform that have been actively exploited in the wild, prompting the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to add one of the flaws to its Known Exploited Vulnerabilities catalog.

The flaws, tracked as CVE-2026-1281 and CVE-2026-1340, both carry a CVSS score of 9.8 out of 10, representing the most severe risk level. These code injection vulnerabilities allow unauthenticated remote code execution, meaning attackers can compromise systems without any credentials or user interaction.

What’s at Risk?

The vulnerabilities affect multiple versions of EPMM:

  • Versions 12.5.0.0 and earlier
  • Versions 12.6.0.0 and earlier
  • Versions 12.7.0.0 and earlier
  • Versions 12.5.1.0 and earlier
  • Versions 12.6.1.0 and earlier

The issues specifically impact the In-House Application Distribution and Android File Transfer Configuration features. Importantly, other Ivanti products like Neurons for MDM, EPM, and Sentry remain unaffected.

The Patch Problem

While Ivanti has released temporary patches (RPM updates), there’s a significant caveat: these fixes don’t survive version upgrades. If you upgrade your appliance, you’ll need to reapply the patch. The company plans to permanently fix these issues in EPMM version 12.8.0.0, expected in Q1 2026.

Active Exploitation

“Ivanti is aware of a very limited number of customers whose solutions have been exploited,” the company stated in its advisory. However, security researchers have uncovered evidence suggesting broader exploitation.

WatchTowr Labs researchers reverse-engineered the patches and discovered that attackers can exploit these vulnerabilities through specially crafted HTTP GET requests. The attack leverages Bash scripts that handle application downloads from the EPMM store, allowing malicious code execution through parameter manipulation.

Detection and Response

Ivanti recommends checking Apache access logs at “/var/log/httpd/https-access_log” using this regex pattern to identify potential exploitation attempts:

^(?!127.0.0.1:\d+
.$).?\/mifs\/c\/(aft|app)store\/fob\/.*?404

Legitimate operations generate 200 HTTP response codes, while exploitation attempts result in 404 errors.

Organizations should also audit for:

  • New or modified EPMM administrators
  • Changes to authentication configurations (SSO, LDAP)
  • New mobile applications or configuration changes
  • Modified policies or network configurations
  • VPN configuration changes

Critical Deadline

CISA has mandated that Federal Civilian Executive Branch agencies apply these patches by February 1, 2026. The agency’s inclusion of CVE-2026-1281 in the KEV catalog underscores the severity of these threats.

If Compromised

For organizations detecting signs of compromise, Ivanti recommends:

  1. Restore from a known good backup or build a replacement EPMM
  2. Reset passwords for all local EPMM accounts
  3. Reset LDAP and KDC service account passwords
  4. Revoke and replace the EPMM public certificate
  5. Reset passwords for all configured service accounts

Expert Warning

WatchTowr CEO Benjamin Harris emphasized the gravity: “While patches are available from Ivanti, applying patches will not be enough โ€“ threat actors have been exploiting these vulnerabilities as zero-days, and organizations that are as of disclosure exposing vulnerable instances to the internet must consider them compromised, tear down infrastructure and instigate incident response processes.”

This incident highlights the critical importance of immediate patching and the risks associated with zero-day vulnerabilities in enterprise management systems.


Tags & Viral Phrases:

  • ๐Ÿšจ Zero-Day Emergency
  • ๐Ÿ”ฅ Critical 9.8 CVSS Score
  • โฐ Patch Now or Pay Later
  • ๐Ÿ•ต๏ธโ€โ™‚๏ธ Active Exploitation in Wild
  • ๐Ÿ›ก๏ธ Federal Agencies on High Alert
  • ๐Ÿ’ป Enterprise Security Crisis
  • ๐Ÿ”’ Ivanti EPMM Under Attack
  • โš ๏ธ Don’t Wait for Version 12.8
  • ๐Ÿ” Check Your Logs Today
  • ๐Ÿ’ฅ Remote Code Execution Nightmare
  • ๐Ÿ“‹ Mandatory Federal Patching
  • ๐Ÿข Enterprise Management System Compromised
  • ๐ŸŽฏ Targeted Attacks on Mobile Device Management
  • ๐ŸŒ Internet-Exposure = Immediate Risk
  • ๐Ÿ”„ RPM Patches Don’t Survive Upgrades
  • ๐Ÿงช WatchTowr Labs Reverse-Engineering
  • ๐Ÿ“Š Two Critical Vulnerabilities Exposed
  • ๐Ÿ”ง Emergency Security Updates Released
  • ๐Ÿ’ฃ Bash Script Exploitation Vector
  • ๐Ÿ“ฑ Android File Transfer at Risk
  • ๐Ÿ“ฆ In-House App Distribution Broken
  • ๐Ÿ”— CISA KEV Catalog Addition
  • ๐Ÿ“… February 1 Deadline for Federal Agencies
  • ๐Ÿ”„ Rebuild or Restore: No Middle Ground
  • ๐ŸŽฏ Limited Customer Exploitation Reports
  • ๐Ÿ”’ Reset All Credentials Immediately
  • ๐Ÿš€ Version 12.8 Coming Q1 2026
  • ๐Ÿ” Regex Pattern for Detection
  • ๐Ÿ“‹ Comprehensive Audit Checklist Required
  • ๐ŸŒ Internet-Facing Appliances Most Vulnerable
  • ๐ŸŽฏ Attackers Don’t Need Authentication
  • ๐Ÿ“Š Two Separate but Equal CVSS 9.8 Flaws
  • ๐Ÿ”ง Temporary RPM Fix Available Now
  • ๐Ÿšจ Enterprise Security Teams: Immediate Action Required
  • ๐Ÿ“‹ Multiple Version Support Affected
  • ๐Ÿ” Log Analysis Critical for Detection
  • ๐Ÿ”„ Incident Response Processes Must Be Initiated
  • ๐ŸŽฏ Threat Actors Exploiting as Zero-Days
  • ๐Ÿ”’ Certificate Revocation Necessary
  • ๐Ÿ“Š Two Forms of Persistence Observed
  • ๐Ÿ“ฑ Mobile Device Management Under Siege
  • ๐Ÿ”ง Apache HTTPd Configuration Modified
  • ๐Ÿ“‹ Java Classes Replacing Bash Scripts
  • ๐ŸŽฏ Specially Crafted HTTP GET Requests
  • ๐Ÿ” Salt String Index Manipulation
  • ๐Ÿ“… Time-Based Parameter Exploitation
  • ๐Ÿ”ง App Store File Retrieval Compromised
  • ๐Ÿ“Š Two Different Attack Vectors
  • ๐ŸŒ Internet Exposure = Immediate Compromise
  • ๐ŸŽฏ Federal Agencies Given Hard Deadline
  • ๐Ÿ”’ No Authentication Required for Attack
  • ๐Ÿ“‹ Complete Environment Reset Recommended
  • ๐Ÿ” Multiple Configuration Points to Audit
  • ๐Ÿ”„ Backup Restoration or Fresh Build
  • ๐ŸŽฏ Enterprise Management Platform Targeted
  • ๐Ÿ”ง Critical Infrastructure Protection Required
  • ๐Ÿ“Š Two Separate but Related Vulnerabilities
  • ๐ŸŒ Remote Code Execution via HTTP
  • ๐Ÿ“‹ Comprehensive Security Response Needed
  • ๐ŸŽฏ Zero-Day Exploitation Confirmed
  • ๐Ÿ”’ Immediate Patching Non-Negotiable
  • ๐Ÿ“Š Critical Severity Rating Justified
  • ๐ŸŒ Enterprise Security Crisis Escalating
  • ๐Ÿ“‹ Multiple Products Affected
  • ๐ŸŽฏ Attack Surface Expanded
  • ๐Ÿ”ง Security Updates Rolling Out
  • ๐Ÿ“Š CVE-2026-1281 and CVE-2026-1340
  • ๐ŸŒ Federal Cybersecurity Mandate Issued
  • ๐Ÿ“‹ Known Exploited Vulnerabilities Catalog
  • ๐ŸŽฏ Unauthenticated Remote Code Execution
  • ๐Ÿ”’ Enterprise Security Teams on High Alert
  • ๐Ÿ“Š Two Critical Flaws Require Immediate Attention
  • ๐ŸŒ Internet-Facing Systems Most at Risk
  • ๐Ÿ“‹ Comprehensive Audit and Response Required
  • ๐ŸŽฏ Zero-Day Vulnerabilities Actively Exploited
  • ๐Ÿ”ง Emergency Patches Available Now
  • ๐Ÿ“Š CVSS 9.8: Maximum Severity Rating
  • ๐ŸŒ Federal Agencies Must Comply by Deadline
  • ๐Ÿ“‹ Multiple Versions Need Patching
  • ๐ŸŽฏ Enterprise Management Systems Compromised
  • ๐Ÿ”’ Security Teams Must Act Immediately
  • ๐Ÿ“Š Two Separate Vulnerabilities Tracked
  • ๐ŸŒ Active Wild Exploitation Confirmed
  • ๐Ÿ“‹ Comprehensive Detection and Response Required
  • ๐ŸŽฏ Enterprise Security Crisis Ongoing
  • ๐Ÿ”ง Patches Available But With Caveats
  • ๐Ÿ“Š Two Critical Security Flaws
  • ๐ŸŒ Federal Cybersecurity Mandate
  • ๐Ÿ“‹ Known Exploited Vulnerabilities
  • ๐ŸŽฏ Remote Code Execution
  • ๐Ÿ”’ Enterprise Security Emergency
  • ๐Ÿ“Š Critical Severity Rating
  • ๐ŸŒ Active Exploitation
  • ๐Ÿ“‹ Emergency Patches
  • ๐ŸŽฏ Zero-Day Vulnerabilities
  • ๐Ÿ”ง Security Updates
  • ๐Ÿ“Š CVSS 9.8
  • ๐ŸŒ Federal Agencies
  • ๐Ÿ“‹ Comprehensive Audit
  • ๐ŸŽฏ Authentication Bypass
  • ๐Ÿ”’ Immediate Action Required
  • ๐Ÿ“Š Multiple Versions Affected
  • ๐ŸŒ Internet Exposure Risk
  • ๐Ÿ“‹ Backup and Restore
  • ๐ŸŽฏ Security Response
  • ๐Ÿ”ง Temporary Fix
  • ๐Ÿ“Š Two Vulnerabilities
  • ๐ŸŒ Security Crisis
  • ๐Ÿ“‹ Detection Methods
  • ๐ŸŽฏ Enterprise Systems
  • ๐Ÿ”’ Security Teams
  • ๐Ÿ“Š Critical Flaws
  • ๐ŸŒ Federal Mandate
  • ๐Ÿ“‹ Known Exploited
  • ๐ŸŽฏ Code Execution
  • ๐Ÿ”ง Emergency Response
  • ๐Ÿ“Š Severity Rating
  • ๐ŸŒ Active Attacks
  • ๐Ÿ“‹ Patch Now
  • ๐ŸŽฏ Security Emergency
  • ๐Ÿ”’ Enterprise Protection
  • ๐Ÿ“Š Vulnerability Management
  • ๐ŸŒ Cybersecurity Alert
  • ๐Ÿ“‹ Comprehensive Response
  • ๐ŸŽฏ Enterprise Security
  • ๐Ÿ”ง Security Patches
  • ๐Ÿ“Š Critical Update
  • ๐ŸŒ Federal Compliance
  • ๐Ÿ“‹ Security Audit
  • ๐ŸŽฏ Remote Access
  • ๐Ÿ”’ Enterprise Risk
  • ๐Ÿ“Š Security Rating
  • ๐ŸŒ Active Threats
  • ๐Ÿ“‹ Emergency Action
  • ๐ŸŽฏ Security Teams Alert
  • ๐Ÿ”ง Patch Management
  • ๐Ÿ“Š Vulnerability Severity
  • ๐ŸŒ Cybersecurity Emergency
  • ๐Ÿ“‹ Security Response Plan
  • ๐ŸŽฏ Enterprise Protection Required
  • ๐Ÿ”’ Security Crisis Management
  • ๐Ÿ“Š Critical Security Update
  • ๐ŸŒ Federal Security Mandate
  • ๐Ÿ“‹ Comprehensive Security Audit
  • ๐ŸŽฏ Enterprise Security Teams
  • ๐Ÿ”ง Emergency Security Patch
  • ๐Ÿ“Š Two Critical Vulnerabilities
  • ๐ŸŒ Active Exploitation in Wild
  • ๐Ÿ“‹ Security Response Required
  • ๐ŸŽฏ Enterprise Management Systems
  • ๐Ÿ”’ Security Emergency Response
  • ๐Ÿ“Š Critical Security Rating
  • ๐ŸŒ Federal Cybersecurity Requirements
  • ๐Ÿ“‹ Comprehensive Detection Methods
  • ๐ŸŽฏ Enterprise Security Crisis
  • ๐Ÿ”ง Security Update Available
  • ๐Ÿ“Š Critical Severity Vulnerabilities
  • ๐ŸŒ Federal Agencies Required
  • ๐Ÿ“‹ Security Audit Checklist
  • ๐ŸŽฏ Enterprise Security Response
  • ๐Ÿ”’ Security Emergency Action
  • ๐Ÿ“Š Critical Update Required
  • ๐ŸŒ Active Security Threats
  • ๐Ÿ“‹ Emergency Security Response
  • ๐ŸŽฏ Enterprise Security Protection
  • ๐Ÿ”ง Security Patch Available
  • ๐Ÿ“Š Critical Security Flaws
  • ๐ŸŒ Federal Security Compliance
  • ๐Ÿ“‹ Comprehensive Security Response
  • ๐ŸŽฏ Enterprise Security Teams Required
  • ๐Ÿ”’ Security Emergency Management
  • ๐Ÿ“Š Critical Security Update Available
  • ๐ŸŒ Federal Security Mandate Required
  • ๐Ÿ“‹ Comprehensive Security Audit Required
  • ๐ŸŽฏ Enterprise Security Crisis Management
  • ๐Ÿ”ง Security Update Required
  • ๐Ÿ“Š Critical Security Vulnerabilities
  • ๐ŸŒ Federal Security Requirements
  • ๐Ÿ“‹ Security Response Plan Required
  • ๐ŸŽฏ Enterprise Security Protection Required
  • ๐Ÿ”’ Security Emergency Response Required
  • ๐Ÿ“Š Critical Security Update Required
  • ๐ŸŒ Federal Security Compliance Required
  • ๐Ÿ“‹ Comprehensive Security Detection
  • ๐ŸŽฏ Enterprise Security Crisis Response
  • ๐Ÿ”ง Security Patch Required
  • ๐Ÿ“Š Critical Security Rating Required
  • ๐ŸŒ Active Security Threats Required
  • ๐Ÿ“‹ Emergency Security Action Required
  • ๐ŸŽฏ Enterprise Security Teams Required
  • ๐Ÿ”’ Security Emergency Management Required
  • ๐Ÿ“Š Critical Security Update Available Now
  • ๐ŸŒ Federal Security Mandate Now
  • ๐Ÿ“‹ Comprehensive Security Audit Now
  • ๐ŸŽฏ Enterprise Security Crisis Now
  • ๐Ÿ”ง Security Update Now
  • ๐Ÿ“Š Critical Security Vulnerabilities Now
  • ๐ŸŒ Federal Security Requirements Now
  • ๐Ÿ“‹ Security Response Plan Now
  • ๐ŸŽฏ Enterprise Security Protection Now
  • ๐Ÿ”’ Security Emergency Response Now
  • ๐Ÿ“Š Critical Security Update Now Required
  • ๐ŸŒ Federal Security Compliance Now Required
  • ๐Ÿ“‹ Comprehensive Security Detection Now
  • ๐ŸŽฏ Enterprise Security Crisis Response Now
  • ๐Ÿ”ง Security Patch Now Required
  • ๐Ÿ“Š Critical Security Rating Now Required
  • ๐ŸŒ Active Security Threats Now Required
  • ๐Ÿ“‹ Emergency Security Action Now Required
  • ๐ŸŽฏ Enterprise Security Teams Now Required
  • ๐Ÿ”’ Security Emergency Management Now Required

,

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *