PT-2026-5357 · Ivanti · Ivanti Endpoint Manager Mobile
Published
2026-01-29
·
Updated
2026-02-02
·
CVE-2026-1281
CVSS v3.1
10
10
Critical
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Ivanti Endpoint Manager Mobile (EPMM) versions prior to 12.8.0.0
Ivanti Endpoint Manager Mobile (EPMM) versions prior to 12.7.0.0
Description
A code injection flaw exists in Ivanti Endpoint Manager Mobile (EPMM) that allows attackers to achieve unauthenticated remote code execution (RCE). This issue is actively exploited in zero-day attacks. Approximately 1600 instances worldwide are exposed, with a high concentration in Germany. The root cause is improper input handling in a server-side template rendering pathway, allowing attacker-controlled expressions to be evaluated, resulting in arbitrary code execution. Attackers can discover internet-exposed EPMM management interfaces and send crafted requests to trigger code execution. Successful exploitation can lead to full remote compromise of the EPMM server, potential takeover of the MDM infrastructure, credential exposure, and the ability to pivot into internal networks. The vulnerability is related to a template rendering workflow exposed via the management interface.
Recommendations
Ivanti Endpoint Manager Mobile versions prior to 12.8.0.0: Apply the emergency RPM patch provided by Ivanti, and re-install it after any upgrades.
Ivanti Endpoint Manager Mobile versions prior to 12.7.0.0: Apply Ivanti’s security updates for EPMM as published in the official advisory channel.
Restrict access to management ports (typically 443/8443) to VPN/jump hosts and allowlisted IPs only.
If feasible, disable non-essential template/rendering features/endpoints until patched.
Review EPMM logs for unusual POST activity to template-related services, authentication anomalies, and unexpected child processes spawned by Java services.
Monitor for new files under EPMM install paths and suspicious outbound connections from the EPMM host.
If exploitation is suspected, isolate the host, preserve disk/memory, rotate all integration secrets, and review recent device profile/app pushes for tampering.
Fix
RCE
Code Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2026-01061
CVE-2026-1281
Affected Products
Ivanti Endpoint Manager Mobile
References · 112
- https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340 · Vendor Advisory
- https://bdu.fstec.ru/vul/2026-01061 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2026-1281 · Security Note
- https://twitter.com/the_yellow_fall/status/2017053410969710860 · Twitter Post
- https://reddit.com/r/TechNadu/comments/1qr4t0x/ivanti_has_confirmed_active_exploitation_of_two · Reddit Post
- https://twitter.com/cyberwarzo44531/status/2017547428128321812 · Twitter Post
- https://twitter.com/rapid7/status/2017272761601647091 · Twitter Post
- https://twitter.com/WhichbufferArda/status/2016998576417624071 · Twitter Post
- https://reddit.com/r/SecOpsDaily/comments/1qrb5sd/someone_knows_bash_far_too_well_and_we_love_it · Reddit Post
- https://t.me/RNetsec/22502 · Telegram Post
- https://reddit.com/r/pwnhub/comments/1qr9wbl/critical_ivanti_epmm_zeroday_exploits_demand · Reddit Post
- https://twitter.com/transilienceai/status/2017840591858528417 · Twitter Post
- https://twitter.com/TweetThreatNews/status/2017447828864282753 · Twitter Post
- https://reddit.com/r/SecOpsDaily/comments/1qqo3cr/ivanti_warns_of_two_epmm_flaws_exploited_in · Reddit Post
- https://twitter.com/CorksonCash/status/2017795471268581625 · Twitter Post