Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Ivanti Patches Exploited EPMM Zero-Days
    Cybersecurity

    Ivanti Patches Exploited EPMM Zero-Days

    adminBy adminFebruary 1, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Ivanti vulnerability exploited
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Ivanti on Thursday announced emergency patches for two critical-severity vulnerabilities in Endpoint Manager Mobile (EPMM) that have been exploited in the wild as zero-days.

    Tracked as CVE-2026-1281 and CVE-2026-1340 (CVSS score of 9.8), the bugs are described as code injection issues that could be exploited by unauthenticated attackers to achieve remote code execution (RCE).

    The flaws impact the in-house application distribution and the Android file transfer configuration features of EPMM.

    Successful exploitation of the zero-days could allow attackers to execute arbitrary code, move laterally to the connected environment, and access sensitive information stored in the EPMM.

    Such information may include administrator information (name, email, and username), user information (name, email, and username, user principal name for AD), and mobile device details (phone number, location, identifier, IMEI, IP address, UUID, application details, and other identification data).

    “We are aware of a very limited number of customers whose solution has been exploited at the time of disclosure,” Ivanti notes in its advisory.

    Advertisement. Scroll to continue reading.

    According to the company, all EPMM versions up to 12.5.0.0, 12.6.0.0, 12.7.0.0, 12.5.1.0, and 12.6.1.0 are affected.

    Ivanti released RPM patches 12.x.0.x and 12.x.1.x that address the security defects. The fixes are version-specific, and customers need to apply only the RPM applicable to their EPMM iteration.

    The company notes that the RPM scripts need to be reapplied in the event EPMM is updated to a newer version.

    “We strongly encourage all EPMM customers to adopt version 12.8.0.0 once it has been released later in Q1 2026. Once you have upgraded to 12.8.0.0, you will not need to reapply the RPM script,” Ivanti notes.

    Scarce information on exploitation

    No other Ivanti products are affected by the exploited zero-day vulnerabilities, and the company has published generic information on detecting exploitation attempts.

    “Due to the small number of known-impacted customers, Ivanti does not have enough information about the threat actor tactics to provide proven, reliable atomic indicators,” the company notes.

    Based on the exploitation of previous EPMM bugs, Ivanti says, two common methods of persistence have surfaced: the deployment of web shell capabilities targeting HTTP error pages, and the deployment of reverse shells.

    Exploitation attempts using these techniques can be identified either through unexpected WAR or JAR files on the system, or through firewall log entries for outbound network connections initiated by the appliance.

    “Based on Ivanti’s analysis of threat actor toolkits targeting older vulnerabilities on the Ivanti appliance, analysts should assume that the threat actor techniques will likely include the clearing of logs or removal of specific log entries,” the company notes.

    Ivanti warns that, in addition to compromising the environment and accessing the sensitive information available on EPMM’s MIFS portal, attackers could make changes to the EPMM configuration to add new admin accounts, modify authentication policies, push new apps to devices, and modify network configurations.

    “Please note that this is general guidance and Ivanti has not observed or received any indication that such changes have been made to a customer’s EPMM appliance maliciously,” Ivanti notes.

    In the event organizations identify successful compromise of EPMM instances, Ivanti recommends either restoring the appliance from a known good backup or building a fresh iteration and migrating all data.

    “Ivanti does NOT recommend attempting to clean the system after it has been compromised,” the company notes.

    Ivanti also notes that organizations should restore their systems while keeping them disconnected from the internet, and that mitigations and patches should be applied before returning the system to service.

    The remediation and recovery actions should also include resetting the passwords for local EPMM accounts, for LDAP and/or KDC service accounts, and for any other internal or external service accounts, and revoking and replacing the public certificate EPMM uses.

    CISA KEV

    On Thursday, the US cybersecurity agency CISA added CVE-2026-1281 to its Known Exploited Vulnerabilities (KEV) catalog, urging federal agencies to patch it by February 1.

    As mandated by Binding Operational Directive (BOD) 22-01, federal agencies typically have three weeks to apply fixes and mitigations for vulnerabilities newly added to the KEV list.

    The short timeframe provided for CVE-2026-1281 indicates the severity of the flaw. Should a federal agency be unable to meet the deadline, it is required to take the necessary steps to comply with the directive as soon as possible.

    “Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice,” CISA notes.

    Related: Ivanti EPM Update Patches Critical Remote Code Execution Flaw

    Related: APTs, Cybercriminals Widely Exploiting WinRAR Vulnerability

    Related: Fortinet Patches Exploited FortiCloud SSO Authentication Bypass

    Related: 2024 VMware Flaw Now in Attackers’ Crosshairs

    EPMM Exploited Ivanti Patches ZeroDays
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleYou’re using the wrong cable for your soundbar (and it’s killing the audio quality)
    Next Article What to Expect the First Time You Go to the Gym
    admin
    • Website

    Related Posts

    Madison Square Garden Data Breach Confirmed Months After Hacker Attack

    March 3, 2026

    30 Alleged Members of ‘The Com’ Arrested in Project Compass

    March 3, 2026

    Google Develops Merkle Tree Certificates to Enable Quantum-Resistant HTTPS in Chrome

    March 3, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    3 great Paramount+ movies you’ll want to watch this week (March 2

    March 3, 2026

    Nvidia partners with optics technology vendors Lumentum and Coherent to enhance AI infrastructure

    March 3, 2026

    Madison Square Garden Data Breach Confirmed Months After Hacker Attack

    March 3, 2026

    Google AI Generated Landing Page Patent Is Limited To Shopping & Ads

    March 3, 2026
    Categories
    • Blogging (32)
    • Cybersecurity (568)
    • Privacy & Online Earning (78)
    • SEO & Digital Marketing (355)
    • Tech Tools & Mobile / Apps (705)
    • WiFi / Internet & Networking (103)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    3 great Paramount+ movies you’ll want to watch this week (March 2

    March 3, 2026

    Nvidia partners with optics technology vendors Lumentum and Coherent to enhance AI infrastructure

    March 3, 2026

    Madison Square Garden Data Breach Confirmed Months After Hacker Attack

    March 3, 2026
    Most Popular
    • 3 great Paramount+ movies you’ll want to watch this week (March 2
    • Nvidia partners with optics technology vendors Lumentum and Coherent to enhance AI infrastructure
    • Madison Square Garden Data Breach Confirmed Months After Hacker Attack
    • Google AI Generated Landing Page Patent Is Limited To Shopping & Ads
    • 6 massive sci-fi and fantasy shows you need to watch in March
    • 30 Alleged Members of ‘The Com’ Arrested in Project Compass
    • Samsung Sticker Center 2.7.03.34 by Samsung Electronics Co., Ltd.
    • Google Develops Merkle Tree Certificates to Enable Quantum-Resistant HTTPS in Chrome
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.