Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released
Critical Zero-Day Flaws Hit Ivanti EPMM: Urgent Action Required
Ivanti has issued emergency patches for two critical vulnerabilities in its Endpoint Manager Mobile (EPMM) platform that have been actively exploited in the wild, prompting the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to add one of the flaws to its Known Exploited Vulnerabilities catalog.
The flaws, tracked as CVE-2026-1281 and CVE-2026-1340, both carry a CVSS score of 9.8 out of 10, representing the most severe risk level. These code injection vulnerabilities allow unauthenticated remote code execution, meaning attackers can compromise systems without any credentials or user interaction.
What’s at Risk?
The vulnerabilities affect multiple versions of EPMM:
- Versions 12.5.0.0 and earlier
- Versions 12.6.0.0 and earlier
- Versions 12.7.0.0 and earlier
- Versions 12.5.1.0 and earlier
- Versions 12.6.1.0 and earlier
The issues specifically impact the In-House Application Distribution and Android File Transfer Configuration features. Importantly, other Ivanti products like Neurons for MDM, EPM, and Sentry remain unaffected.
The Patch Problem
While Ivanti has released temporary patches (RPM updates), there’s a significant caveat: these fixes don’t survive version upgrades. If you upgrade your appliance, you’ll need to reapply the patch. The company plans to permanently fix these issues in EPMM version 12.8.0.0, expected in Q1 2026.
Active Exploitation
“Ivanti is aware of a very limited number of customers whose solutions have been exploited,” the company stated in its advisory. However, security researchers have uncovered evidence suggesting broader exploitation.
WatchTowr Labs researchers reverse-engineered the patches and discovered that attackers can exploit these vulnerabilities through specially crafted HTTP GET requests. The attack leverages Bash scripts that handle application downloads from the EPMM store, allowing malicious code execution through parameter manipulation.
Detection and Response
Ivanti recommends checking Apache access logs at “/var/log/httpd/https-access_log” using this regex pattern to identify potential exploitation attempts:
^(?!127.0.0.1:\d+
.$).?\/mifs\/c\/(aft|app)store\/fob\/.*?404
Legitimate operations generate 200 HTTP response codes, while exploitation attempts result in 404 errors.
Organizations should also audit for:
- New or modified EPMM administrators
- Changes to authentication configurations (SSO, LDAP)
- New mobile applications or configuration changes
- Modified policies or network configurations
- VPN configuration changes
Critical Deadline
CISA has mandated that Federal Civilian Executive Branch agencies apply these patches by February 1, 2026. The agency’s inclusion of CVE-2026-1281 in the KEV catalog underscores the severity of these threats.
If Compromised
For organizations detecting signs of compromise, Ivanti recommends:
- Restore from a known good backup or build a replacement EPMM
- Reset passwords for all local EPMM accounts
- Reset LDAP and KDC service account passwords
- Revoke and replace the EPMM public certificate
- Reset passwords for all configured service accounts
Expert Warning
WatchTowr CEO Benjamin Harris emphasized the gravity: “While patches are available from Ivanti, applying patches will not be enough โ threat actors have been exploiting these vulnerabilities as zero-days, and organizations that are as of disclosure exposing vulnerable instances to the internet must consider them compromised, tear down infrastructure and instigate incident response processes.”
This incident highlights the critical importance of immediate patching and the risks associated with zero-day vulnerabilities in enterprise management systems.
Tags & Viral Phrases:
- ๐จ Zero-Day Emergency
- ๐ฅ Critical 9.8 CVSS Score
- โฐ Patch Now or Pay Later
- ๐ต๏ธโโ๏ธ Active Exploitation in Wild
- ๐ก๏ธ Federal Agencies on High Alert
- ๐ป Enterprise Security Crisis
- ๐ Ivanti EPMM Under Attack
- โ ๏ธ Don’t Wait for Version 12.8
- ๐ Check Your Logs Today
- ๐ฅ Remote Code Execution Nightmare
- ๐ Mandatory Federal Patching
- ๐ข Enterprise Management System Compromised
- ๐ฏ Targeted Attacks on Mobile Device Management
- ๐ Internet-Exposure = Immediate Risk
- ๐ RPM Patches Don’t Survive Upgrades
- ๐งช WatchTowr Labs Reverse-Engineering
- ๐ Two Critical Vulnerabilities Exposed
- ๐ง Emergency Security Updates Released
- ๐ฃ Bash Script Exploitation Vector
- ๐ฑ Android File Transfer at Risk
- ๐ฆ In-House App Distribution Broken
- ๐ CISA KEV Catalog Addition
- ๐ February 1 Deadline for Federal Agencies
- ๐ Rebuild or Restore: No Middle Ground
- ๐ฏ Limited Customer Exploitation Reports
- ๐ Reset All Credentials Immediately
- ๐ Version 12.8 Coming Q1 2026
- ๐ Regex Pattern for Detection
- ๐ Comprehensive Audit Checklist Required
- ๐ Internet-Facing Appliances Most Vulnerable
- ๐ฏ Attackers Don’t Need Authentication
- ๐ Two Separate but Equal CVSS 9.8 Flaws
- ๐ง Temporary RPM Fix Available Now
- ๐จ Enterprise Security Teams: Immediate Action Required
- ๐ Multiple Version Support Affected
- ๐ Log Analysis Critical for Detection
- ๐ Incident Response Processes Must Be Initiated
- ๐ฏ Threat Actors Exploiting as Zero-Days
- ๐ Certificate Revocation Necessary
- ๐ Two Forms of Persistence Observed
- ๐ฑ Mobile Device Management Under Siege
- ๐ง Apache HTTPd Configuration Modified
- ๐ Java Classes Replacing Bash Scripts
- ๐ฏ Specially Crafted HTTP GET Requests
- ๐ Salt String Index Manipulation
- ๐ Time-Based Parameter Exploitation
- ๐ง App Store File Retrieval Compromised
- ๐ Two Different Attack Vectors
- ๐ Internet Exposure = Immediate Compromise
- ๐ฏ Federal Agencies Given Hard Deadline
- ๐ No Authentication Required for Attack
- ๐ Complete Environment Reset Recommended
- ๐ Multiple Configuration Points to Audit
- ๐ Backup Restoration or Fresh Build
- ๐ฏ Enterprise Management Platform Targeted
- ๐ง Critical Infrastructure Protection Required
- ๐ Two Separate but Related Vulnerabilities
- ๐ Remote Code Execution via HTTP
- ๐ Comprehensive Security Response Needed
- ๐ฏ Zero-Day Exploitation Confirmed
- ๐ Immediate Patching Non-Negotiable
- ๐ Critical Severity Rating Justified
- ๐ Enterprise Security Crisis Escalating
- ๐ Multiple Products Affected
- ๐ฏ Attack Surface Expanded
- ๐ง Security Updates Rolling Out
- ๐ CVE-2026-1281 and CVE-2026-1340
- ๐ Federal Cybersecurity Mandate Issued
- ๐ Known Exploited Vulnerabilities Catalog
- ๐ฏ Unauthenticated Remote Code Execution
- ๐ Enterprise Security Teams on High Alert
- ๐ Two Critical Flaws Require Immediate Attention
- ๐ Internet-Facing Systems Most at Risk
- ๐ Comprehensive Audit and Response Required
- ๐ฏ Zero-Day Vulnerabilities Actively Exploited
- ๐ง Emergency Patches Available Now
- ๐ CVSS 9.8: Maximum Severity Rating
- ๐ Federal Agencies Must Comply by Deadline
- ๐ Multiple Versions Need Patching
- ๐ฏ Enterprise Management Systems Compromised
- ๐ Security Teams Must Act Immediately
- ๐ Two Separate Vulnerabilities Tracked
- ๐ Active Wild Exploitation Confirmed
- ๐ Comprehensive Detection and Response Required
- ๐ฏ Enterprise Security Crisis Ongoing
- ๐ง Patches Available But With Caveats
- ๐ Two Critical Security Flaws
- ๐ Federal Cybersecurity Mandate
- ๐ Known Exploited Vulnerabilities
- ๐ฏ Remote Code Execution
- ๐ Enterprise Security Emergency
- ๐ Critical Severity Rating
- ๐ Active Exploitation
- ๐ Emergency Patches
- ๐ฏ Zero-Day Vulnerabilities
- ๐ง Security Updates
- ๐ CVSS 9.8
- ๐ Federal Agencies
- ๐ Comprehensive Audit
- ๐ฏ Authentication Bypass
- ๐ Immediate Action Required
- ๐ Multiple Versions Affected
- ๐ Internet Exposure Risk
- ๐ Backup and Restore
- ๐ฏ Security Response
- ๐ง Temporary Fix
- ๐ Two Vulnerabilities
- ๐ Security Crisis
- ๐ Detection Methods
- ๐ฏ Enterprise Systems
- ๐ Security Teams
- ๐ Critical Flaws
- ๐ Federal Mandate
- ๐ Known Exploited
- ๐ฏ Code Execution
- ๐ง Emergency Response
- ๐ Severity Rating
- ๐ Active Attacks
- ๐ Patch Now
- ๐ฏ Security Emergency
- ๐ Enterprise Protection
- ๐ Vulnerability Management
- ๐ Cybersecurity Alert
- ๐ Comprehensive Response
- ๐ฏ Enterprise Security
- ๐ง Security Patches
- ๐ Critical Update
- ๐ Federal Compliance
- ๐ Security Audit
- ๐ฏ Remote Access
- ๐ Enterprise Risk
- ๐ Security Rating
- ๐ Active Threats
- ๐ Emergency Action
- ๐ฏ Security Teams Alert
- ๐ง Patch Management
- ๐ Vulnerability Severity
- ๐ Cybersecurity Emergency
- ๐ Security Response Plan
- ๐ฏ Enterprise Protection Required
- ๐ Security Crisis Management
- ๐ Critical Security Update
- ๐ Federal Security Mandate
- ๐ Comprehensive Security Audit
- ๐ฏ Enterprise Security Teams
- ๐ง Emergency Security Patch
- ๐ Two Critical Vulnerabilities
- ๐ Active Exploitation in Wild
- ๐ Security Response Required
- ๐ฏ Enterprise Management Systems
- ๐ Security Emergency Response
- ๐ Critical Security Rating
- ๐ Federal Cybersecurity Requirements
- ๐ Comprehensive Detection Methods
- ๐ฏ Enterprise Security Crisis
- ๐ง Security Update Available
- ๐ Critical Severity Vulnerabilities
- ๐ Federal Agencies Required
- ๐ Security Audit Checklist
- ๐ฏ Enterprise Security Response
- ๐ Security Emergency Action
- ๐ Critical Update Required
- ๐ Active Security Threats
- ๐ Emergency Security Response
- ๐ฏ Enterprise Security Protection
- ๐ง Security Patch Available
- ๐ Critical Security Flaws
- ๐ Federal Security Compliance
- ๐ Comprehensive Security Response
- ๐ฏ Enterprise Security Teams Required
- ๐ Security Emergency Management
- ๐ Critical Security Update Available
- ๐ Federal Security Mandate Required
- ๐ Comprehensive Security Audit Required
- ๐ฏ Enterprise Security Crisis Management
- ๐ง Security Update Required
- ๐ Critical Security Vulnerabilities
- ๐ Federal Security Requirements
- ๐ Security Response Plan Required
- ๐ฏ Enterprise Security Protection Required
- ๐ Security Emergency Response Required
- ๐ Critical Security Update Required
- ๐ Federal Security Compliance Required
- ๐ Comprehensive Security Detection
- ๐ฏ Enterprise Security Crisis Response
- ๐ง Security Patch Required
- ๐ Critical Security Rating Required
- ๐ Active Security Threats Required
- ๐ Emergency Security Action Required
- ๐ฏ Enterprise Security Teams Required
- ๐ Security Emergency Management Required
- ๐ Critical Security Update Available Now
- ๐ Federal Security Mandate Now
- ๐ Comprehensive Security Audit Now
- ๐ฏ Enterprise Security Crisis Now
- ๐ง Security Update Now
- ๐ Critical Security Vulnerabilities Now
- ๐ Federal Security Requirements Now
- ๐ Security Response Plan Now
- ๐ฏ Enterprise Security Protection Now
- ๐ Security Emergency Response Now
- ๐ Critical Security Update Now Required
- ๐ Federal Security Compliance Now Required
- ๐ Comprehensive Security Detection Now
- ๐ฏ Enterprise Security Crisis Response Now
- ๐ง Security Patch Now Required
- ๐ Critical Security Rating Now Required
- ๐ Active Security Threats Now Required
- ๐ Emergency Security Action Now Required
- ๐ฏ Enterprise Security Teams Now Required
- ๐ Security Emergency Management Now Required
,




Leave a Reply
Want to join the discussion?Feel free to contribute!