Ivanti disclosed two critical vulnerabilities in Endpoint Manager Mobile (EPMM) on January 29, 2026, that attackers are chaining for unauthenticated remote code execution. CISA added both to the Known Exploited Vulnerabilities catalog the same day—with an unusually short 3-day remediation deadline.

Vulnerability overview

CVECVSSTypeComponent
CVE-2026-12819.8 (Critical)Code InjectionIn-House Application Distribution
CVE-2026-13409.8 (Critical)Code InjectionAndroid File Transfer Configuration

Both vulnerabilities stem from insufficient input validation. According to WatchTowr’s technical analysis, the root cause is “almost hard to believe”: Ivanti was using Bash to process information directly from remote endpoints.

Improper handling of attacker-supplied parameters allows command injection, leading directly to RCE on the appliance without any authentication.

Vulnerable endpoints

CVEFeatureVulnerable Endpoint
CVE-2026-1281In-House Application Distribution/mifs/c/appstore/fob/
CVE-2026-1340Android File Transfer Configuration/mifs/c/aftstore/fob/

Attackers can provide Bash commands as part of malicious HTTP GET requests to these endpoints, resulting in arbitrary OS command execution on the target appliance.

Timeline

DateEvent
Mid-January 2026Zero-day exploitation begins (estimated)
January 29, 2026Ivanti discloses vulnerabilities
January 29, 2026CISA adds CVE-2026-1281 to KEV catalog
January 30, 2026Public PoC exploit available on GitHub
January 30, 2026Shadowserver observes exploitation from 13+ source IPs
February 1, 2026CISA remediation deadline for federal agencies
Q1 2026Permanent fix expected in EPMM 12.8.0.0

Exploitation status

Active exploitation confirmed. Ivanti acknowledged exploitation occurred before disclosure.

MetricValue
Exploitation statusActive zero-day
Source IPs observed13+ (Shadowserver)
Time to public PoC48 hours post-disclosure
Post-exploitation activityWebshells, reverse shells

The Shadowserver Foundation observed a spike in exploitation attempts from at least 13 source IPs within 24 hours of disclosure. Attackers are installing webshells and establishing persistent reverse shells.

Exploitation evolution

WatchTowr researcher Ryan Dewhurst characterized the situation:

“This started as tightly scoped zero-day exploitation. It has since devolved into global mass exploitation by a wide mix of opportunistic actors.”

PhaseTimeframeActor type
Pre-disclosureMid-January 2026Targeted (likely APT)
Disclosure dayJanuary 29, 2026Sophisticated actors
PoC releaseJanuary 30, 2026Opportunistic actors join
Mass exploitationJanuary 31+, 2026Commodity attackers

Internet exposure

Shadowserver scans show approximately 1,600 EPMM instances exposed to the internet, concentrated in:

SectorExposure risk
Government agenciesHigh (slower patching cycles)
Healthcare organizationsHigh (critical MDM infrastructure)
Educational institutionsHigh (resource constraints)

These sectors are particularly vulnerable due to slower patching cycles and the critical nature of mobile device management infrastructure.

What attackers gain

Successful exploitation provides full control of the EPMM appliance and access to:

Data TypeRisk
Administrator credentialsAccount takeover, lateral movement
User informationNames, usernames, email addresses
Device identifiersIMEI, MAC addresses
Phone numbers and IP addressesDevice tracking
Installed applicationsAttack surface mapping
GPS coordinatesPhysical location tracking (if enabled)
Cell tower locationsGeolocation data

Post-compromise capabilities

CapabilityImpact
API accessMake configuration changes to managed devices
Authentication settingsModify device security policies
App deploymentPush malicious applications to managed fleet
Webshell persistenceMaintain access post-patch
Lateral movementPivot to other internal systems

EPMM manages mobile device fleets—compromising it gives attackers visibility into an organization’s entire mobile infrastructure and the ability to weaponize it.

CISA response

CISA’s 3-day remediation deadline (February 1, 2026) for federal agencies signals exceptional severity:

“Organizations that are, as of disclosure, exposing vulnerable instances to the internet must consider them compromised, tear down infrastructure, and instigate incident response processes.”

This is not a “patch and move on” situation. Assume compromise if your EPMM was internet-exposed before patching.

Federal guidance

RequirementDeadline
Apply vendor mitigationsFebruary 1, 2026
OR discontinue use of vulnerable systemsFebruary 1, 2026
Binding Operational DirectiveBOD 22-01

Affected versions

StatusVersions
VulnerableAll EPMM versions before 12.5.0.1
VulnerableVersions 12.5.x, 12.6.x, 12.7.x
Not affectedIvanti Neurons for MDM (cloud-hosted)
Not affectedIvanti Endpoint Manager (EPM)
Not affectedIvanti Sentry
Not affectedOther Ivanti products

Patching complications

Critical warning: The current fix is an RPM patch, not a full version update. This patch does not survive version upgrades. If you apply the patch and later update EPMM, your server becomes vulnerable again.

Patch typeLimitation
RPM interim patchAvailable now
PersistenceDoes NOT survive version upgrades
ReapplicationRequired after any EPMM update
Permanent fixEPMM 12.8.0.0 (Q1 2026)

Remediation

Immediate actions

PriorityAction
CriticalApply the RPM patch from Ivanti’s advisory immediately
CriticalAssume compromise if EPMM was internet-exposed before January 29
CriticalInitiate incident response—hunt for webshells and reverse shells
HighAudit enrollment logs for unauthorized API calls going back to mid-January
HighReview all configuration changes made since mid-January

Compromise indicators

IndicatorMeaning
Webshells in EPMM web directoriesActive compromise
Reverse shell connections from EPMMAttacker access
Unauthorized device enrollmentsPost-exploitation activity
Unexpected configuration changesAttacker manipulation
New administrator accountsPersistence mechanism
Unusual API calls to enrollment endpointsExploitation attempts

Post-patch hardening

ControlPurpose
Restrict network accessEPMM management interfaces should not be internet-accessible
Review device enrollmentsUnexpected enrollments may indicate post-exploitation
Monitor for IoCsCheck for webshells, unauthorized accounts, persistence
Plan for 12.8.0.0 upgradeEnsure patch isn’t lost during future updates
Network segmentationIsolate MDM infrastructure

Detection guidance

Detection methodTarget
Web directory monitoringNew/modified files in EPMM web roots
Network monitoringReverse shell connections from EPMM
API loggingUnauthorized enrollment or configuration calls
Process monitoringUnusual child processes from EPMM services
File integrity monitoringChanges to EPMM application files

Log inspection

Ivanti recommends inspecting Apache access logs for exploitation evidence:

Log location/var/log/httpd/https-access_log
Suspicious patternRequests to /mifs/c/appstore/fob/ or /mifs/c/aftstore/fob/
Exploitation indicatorHTTP 404 responses (expected: 200 for legitimate use)
Time range to reviewMid-January 2026 to present

Network indicators

IndicatorMeaning
Outbound connections from EPMMReverse shell or C2
Unexpected DNS queriesAttacker infrastructure
Large data transfersExfiltration
Connections to known bad IPsCompromised infrastructure

Ivanti vulnerability history

Ivanti products have experienced a series of critical vulnerabilities over the past two years:

YearProductCVESeverity
2024Connect SecureCVE-2024-21887Critical
2024Connect SecureCVE-2024-21893Critical
2025Multiple productsVariousMultiple
2026EPMMCVE-2026-1281Critical (9.8)
2026EPMMCVE-2026-1340Critical (9.8)

Recommendations

For affected organizations

PriorityAction
CriticalPatch immediately—do not wait
CriticalIf internet-exposed, assume compromise
CriticalInitiate incident response procedures
HighRemove EPMM from internet exposure
HighAudit for signs of compromise
OngoingTrack Ivanti security advisories

For security teams

PriorityAction
CriticalInventory all Ivanti EPMM deployments
HighVerify patch application and persistence
HighHunt for webshells and reverse shells
HighReview MDM configuration integrity
MediumEvaluate MDM architecture and exposure
OngoingMonitor for exploitation indicators

Expert assessment

“CVE-2026-1281 and CVE-2026-1340 – unauthenticated RCE vulnerabilities within Ivanti’s Endpoint Manager Mobile (EPMM) – represent the worst of the worst, with threat actors actively compromising systems and deploying backdoors.”

Context

Organizations running Ivanti products should maintain heightened vigilance and consider whether the security posture of these products aligns with their risk tolerance. When Ivanti discloses vulnerabilities, the window between disclosure and exploitation is measured in hours, not days.

The use of Bash to process untrusted input from remote endpoints represents a fundamental architectural flaw. Organizations should factor Ivanti’s security track record into procurement and architecture decisions, particularly for internet-facing infrastructure.

Treat any internet-exposed EPMM instance as compromised until forensically verified otherwise.

Historical Ivanti EPMM zero-days

YearCVE(s)Exploitation
2023CVE-2023-35078Zero-day exploitation
2025CVE-2025-4427 + CVE-2025-4428Chained zero-day exploitation
2026CVE-2026-1281 + CVE-2026-1340Zero-day exploitation

The pattern of repeated EPMM zero-days suggests architectural issues that Ivanti has not fully addressed. Organizations should factor this history into risk assessments for internet-exposed Ivanti infrastructure.