Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Ivanti provides temporary patches for actively exploited EPMM zero-day (CVE-2026-1281)
    Cybersecurity

    Ivanti provides temporary patches for actively exploited EPMM zero-day (CVE-2026-1281)

    adminBy adminFebruary 1, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Ivanti provides temporary patches for actively exploited EPMM zero-day (CVE-2026-1281)
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Ivanti has released provisional patches that fix two critical code injection vulnerabilities in Endpoint Manager Mobile (EPMM), one of which (CVE-2026-1281) has been exploited in zero-day attacks and has been added to CISA’s Known Exploited Vulnerabilities catalog.

    Ivanti EPMM CVE-2026-1281

    Investigating potential compromise

    Both CVE-2026-1281 and CVE-2026-1340 are code injection flaws affecting EPMM’s In-House Application Distribution and Android File Transfer Configuration features. They may allow unauthenticated attackers to achieve remote code execution (RCE) on vulnerable on-premises EPMM installations.

    The vulnerabilities don’t affect the cloud-hosted Ivanti Neurons for Mobile Device Management (MDM), Ivanti Endpoint Manager (EPM), the Ivanti Sentry secure mobile gateway, or any other Ivanti products.

    “We are aware of a very limited number of customers whose solution has been exploited at the time of disclosure,” Ivanti stated in the security advisory released on Thursday, and said that they do not have enough information about the threat actor tactics “to provide proven, reliable atomic indicators [of compromise].”

    But, they say that specific entries in the Apache HTTPD access log can point to successful exploitation of one or both vulnerabilities – if the attackers haven’t tampered with the appliance logs or if the appliance has been set to forward logs to a SIEM solution.

    The company also advised organizations to look for web shells and reverse shells.

    “Ivanti has commonly seen these changes target HTTP error pages, such as 401.jsp. Any requests to these pages with POST methods or with parameters should be considered highly suspicious. Analysts who are performing forensic inspection of the disk should also review for unexpected WAR or JAR files being introduced to the system,” the company explained.

    The presence of reverse shells may be discovered by reviewing firewall logs for long-running connections initiated by the appliance.

    Ivanti says that if attackers achieved RCE on affected EPMM appliances, they had access to potentially sensitive information about managed devices and the ability to make configuration and network changes.

    “For any appliance that you suspect may be impacted, we would recommend you review: EPMM administrators for new or recently changed administrators; authentication configuration, including SSO and LDAP settings; new pushed applications for mobile devices; configuration changes to applications you push to devices, including in-house applications; new or recently modified policies; and network configuration changes, including any network configuration or VPN configuration you push to mobile devices,” Ivanti told customers, but confirmed that there is no evidence of attackers having made any of these changes.

    Finally, the company noted that customers who use Ivanti Sentry in conjunction with EPMM (and thus EPMM that has access to and the ability to perform changes to Sentry), should check the systems accessible through Sentry for evidence of reconnaissance or lateral movement.

    Apply EPMM patch now, upgrade later

    Threat actors are often leveraging zero-day and known vulnerabilities in Ivanti EPMM.

    All Ivanti customers with on-prem EPMM installations should install the provided patch (a RPM script) quickly, as it doesn’t require any downtime or negatively affect any feature.

    “If after applying the RPM script to your appliance, you upgrade to a new version you will need to reinstall the RPM. The permanent fix for this vulnerability will be included in the next product release: 12.8.0.0,” the company stressed.

    “We strongly encourage all EPMM customers to adopt version 12.8.0.0 once it has been released later in Q1 2026. Once you have upgraded to 12.8.0.0, you will not need to reapply the RPM script.”

    If enterprise defenders find evidence that points to compromise, Ivanti advises either restoring the appliance from a “known good” backup, or building a replacement EPMM and then migrating data to the device.

    US federal civilian agencies have until February 1 to apply mitigations, CISA decided.

    Subscribe to our breaking news e-mail alert to never miss out on the latest breaches, vulnerabilities and cybersecurity threats. Subscribe here!

    Actively CVE20261281 EPMM Exploited Ivanti Patches temporary ZeroDay
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous Article5 privacy-focused alternatives to popular Google apps
    Next Article This Moto G 2026 carrier deal makes a lot of sense right now
    admin
    • Website

    Related Posts

    Madison Square Garden Data Breach Confirmed Months After Hacker Attack

    March 3, 2026

    30 Alleged Members of ‘The Com’ Arrested in Project Compass

    March 3, 2026

    Google Develops Merkle Tree Certificates to Enable Quantum-Resistant HTTPS in Chrome

    March 3, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    3 great Paramount+ movies you’ll want to watch this week (March 2

    March 3, 2026

    Nvidia partners with optics technology vendors Lumentum and Coherent to enhance AI infrastructure

    March 3, 2026

    Madison Square Garden Data Breach Confirmed Months After Hacker Attack

    March 3, 2026

    Google AI Generated Landing Page Patent Is Limited To Shopping & Ads

    March 3, 2026
    Categories
    • Blogging (32)
    • Cybersecurity (568)
    • Privacy & Online Earning (78)
    • SEO & Digital Marketing (355)
    • Tech Tools & Mobile / Apps (705)
    • WiFi / Internet & Networking (103)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    3 great Paramount+ movies you’ll want to watch this week (March 2

    March 3, 2026

    Nvidia partners with optics technology vendors Lumentum and Coherent to enhance AI infrastructure

    March 3, 2026

    Madison Square Garden Data Breach Confirmed Months After Hacker Attack

    March 3, 2026
    Most Popular
    • 3 great Paramount+ movies you’ll want to watch this week (March 2
    • Nvidia partners with optics technology vendors Lumentum and Coherent to enhance AI infrastructure
    • Madison Square Garden Data Breach Confirmed Months After Hacker Attack
    • Google AI Generated Landing Page Patent Is Limited To Shopping & Ads
    • 6 massive sci-fi and fantasy shows you need to watch in March
    • 30 Alleged Members of ‘The Com’ Arrested in Project Compass
    • Samsung Sticker Center 2.7.03.34 by Samsung Electronics Co., Ltd.
    • Google Develops Merkle Tree Certificates to Enable Quantum-Resistant HTTPS in Chrome
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.