By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released
Computing

Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released

News Room
Last updated: 2026/01/29 at 11:55 PM
News Room Published 29 January 2026
Share
Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released
SHARE

Ravie LakshmananJan 30, 2026Vulnerability / Enterprise Security

Ivanti has rolled out security updates to address two security flaws impacting Ivanti Endpoint Manager Mobile (EPMM) that have been exploited in zero-day attacks, one of which has been added by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to its Known Exploited Vulnerabilities (KEV) catalog.

The critical-severity vulnerabilities are listed below –

  • CVE-2026-1281 (CVSS score: 9.8) – A code injection allowing attackers to achieve unauthenticated remote code execution
  • CVE-2026-1340 (CVSS score: 9.8) – A code injection allowing attackers to achieve unauthenticated remote code execution

They affect the following versions –

  • EPMM 12.5.0.0 and prior, 12.6.0.0 and prior, and 12.7.0.0 and prior (Fixed in RPM 12.x.0.x)
  • EPMM 12.5.1.0 and prior and 12.6.1.0 and prior (Fixed in RPM 12.x.1.x)
Cybersecurity

However, it bears noting that the RPM patch does not survive a version upgrade and must be reapplied if the appliance is upgraded to a new version. The vulnerabilities will be permanently addressed in EPMM version 12.8.0.0, which will be released later in Q1 2026.

“We are aware of a very limited number of customers whose solution has been exploited at the time of disclosure,” Ivanti said in an advisory, adding it does not have enough information about the threat actor tactics to provide proven, reliable atomic indicators.”

The company noted that CVE-2026-1281 and CVE-2026-1340 affect the In-House Application Distribution and the Android File Transfer Configuration features. These shortcomings do not affect other products, including Ivanti Neurons for MDM, Ivanti Endpoint Manager (EPM), or Ivanti Sentry.

In a technical analysis, Ivanti said it has typically seen two forms of persistence based on prior attacks targeting older vulnerabilities in EPMM. This includes deploying web shells and reverse shells for setting up persistence on the compromised appliances.

“Successful exploitation of the EPMM appliance will enable arbitrary code execution on the appliance,” Ivanti noted. “Aside from lateral movement to the connected environment, EPMM also contains sensitive information about devices managed by the appliance.”

Users are advised to check the Apache access log at “/var/log/httpd/https-access_log” to look for signs of attempted or successful exploitation using the below regular expression (regex) pattern –

^(?!127.0.0.1:d+
.*$).*?/mifs/c/(aft|app)store/fob/.*?404

“Legitimate use of these capabilities will result in 200 HTTP response codes in the Apache Access Log, whereas successful or attempted exploitation will cause 404 HTTP response codes,” it explained.

In addition, customers are being asked to review the following to look for any evidence of unauthorized configuration changes –

  • EPMM administrators for new or recently changed administrators
  • Authentication configuration, including SSO and LDAP settings
  • New push applications for mobile devices
  • Configuration changes to applications you push to devices, including in-house applications
  • New or recently modified policies
  • Network configuration changes, including any network configuration or VPN configuration you push to mobile devices
Cybersecurity

In the event signs of compromise are detected, Ivanti is also urging users to restore the EPMM device from a known good backup or build a replacement EPMM and then migrate data to the device. Once the steps are performed, it’s essential to make the following changes to secure the environment –

  • Reset the password of any local EPMM accounts
  • Reset the password for the LDAP and/or KDC service accounts that perform lookups
  • Revoke and replace the public certificate used for your EPMM
  • Reset the password for any other internal or external service accounts configured with the EPMM solution

The development has prompted CISA to add CVE-2026-1281 to the KEV catalog, requiring Federal Civilian Executive Branch (FCEB) agencies to apply the updates by February 1, 2026.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article I’m a Camera Expert. These 10 Tricks Will Help You Take Way Better Photos With Your Phone I’m a Camera Expert. These 10 Tricks Will Help You Take Way Better Photos With Your Phone
Next Article Best Bluetooth Speakers of 2025 Best Bluetooth Speakers of 2025
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

China greenlights paid robotaxi service in all first-tier cities · TechNode
China greenlights paid robotaxi service in all first-tier cities · TechNode
Computing
Spotify might bring back a feature everyone loved till 2018 (APK teardown)
Spotify might bring back a feature everyone loved till 2018 (APK teardown)
News
Apple Responds to Skyrocketing RAM and Storage Chip Prices
Apple Responds to Skyrocketing RAM and Storage Chip Prices
News
👨🏿‍🚀 Daily – Kuda goes national |
👨🏿‍🚀 Daily – Kuda goes national |
Computing

You Might also Like

China greenlights paid robotaxi service in all first-tier cities · TechNode
Computing

China greenlights paid robotaxi service in all first-tier cities · TechNode

6 Min Read
👨🏿‍🚀 Daily – Kuda goes national |
Computing

👨🏿‍🚀 Daily – Kuda goes national |

6 Min Read
WAIC 2025 unveils China’s latest robotics tech · TechNode
Computing

WAIC 2025 unveils China’s latest robotics tech · TechNode

3 Min Read
Alibaba’s T-Head unveils self-developed AI chip Zhenwu 810E · TechNode
Computing

Alibaba’s T-Head unveils self-developed AI chip Zhenwu 810E · TechNode

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?