Ivanti has once again been forced to disclose an actively exploited zero-day vulnerability in its product line, this time affecting its Endpoint Manager Mobile (EPMM) solution (formerly MobileIron Core). The new flaw, tracked as CVE-2026-6973, is a high-severity remote code execution (RCE) vulnerability that is being exploited in a limited number of targeted attacks. This marks the third EPMM zero-day this year and the 34th Ivanti vulnerability added to the CISA Known Exploited Vulnerabilities (KEV) catalog since 2021, underscoring the persistent targeting of Ivanti products by sophisticated threat actors. CISA has mandated that federal agencies apply patches by May 10, 2026, highlighting the urgency of the threat.
CVE-2026-6973 is an improper input validation vulnerability in Ivanti EPMM. It allows a remote attacker who has already obtained administrative privileges to execute arbitrary code on the affected server. The vulnerability has a CVSS score of 7.2.
While the vulnerability requires the attacker to be authenticated as an administrator, there is significant concern about attack chaining. Security researchers assess that threat actors could combine this new flaw with previously disclosed unauthenticated vulnerabilities from January 2026 (CVE-2026-1281 and CVE-2026-1340). The attack chain would be:
Ivanti has confirmed that CVE-2026-6973 is being actively exploited as a zero-day in a "very limited" number of targeted attacks. Due to this active exploitation, CISA has added it to the KEV catalog, a clear signal that the threat is credible and requires immediate action. While attribution is not confirmed, previous exploits against Ivanti EPMM have been linked to threat actors sponsored by China and Iran.
A successful exploit of this vulnerability, especially when chained with others, results in a full compromise of the EPMM server.
D3-PA - Process Analysis): In a SIEM, correlate authentication logs with process execution logs. An alert should be triggered if a login using a newly created or suspicious admin account is immediately followed by the execution of shell commands or suspicious binaries (e.g., powershell.exe, cmd.exe).D3-SU - Software Update): The highest priority is to update all vulnerable Ivanti EPMM instances to a patched version (12.6.1.1, 12.7.0.1, or 12.8.0.1).Ivanti released critical patches for actively exploited EPMM zero-day (CVE-2026-6973); hundreds of appliances remain exposed.
Applying the patches provided by Ivanti is the only definitive way to remediate CVE-2026-6973.
Mapped D3FEND Techniques:
Regularly auditing and rotating administrative credentials can invalidate stolen credentials used in an attack chain.
Mapped D3FEND Techniques:
Restricting network access to the EPMM management interface reduces the attack surface available to external threat actors.
Mapped D3FEND Techniques:
For CVE-2026-6973, the immediate and most critical action is to apply the patches provided by Ivanti. Given that this is an actively exploited zero-day and part of a pattern of attacks against Ivanti products, delaying patches is not an option. Organizations must deploy the updated versions (12.6.1.1, 12.7.0.1, or 12.8.0.1) to all their EPMM instances. This action directly remediates the improper input validation vulnerability, preventing attackers from achieving remote code execution. Due to the high risk of attack chaining with older vulnerabilities, patching should be accompanied by a full credential rotation for all administrative accounts on the EPMM server, as recommended by Ivanti.
To detect potential exploitation of CVE-2026-6973, security teams should implement robust Process Analysis on their Ivanti EPMM servers. This involves using an EDR or host-based monitoring tool (like Sysmon) to watch for anomalous process creation events. Specifically, the core EPMM application process should never spawn interactive shells like cmd.exe or powershell.exe. A detection rule should be created to trigger a high-severity alert if this behavior is observed. This provides a strong signal of successful remote code execution. Correlating this process event with a preceding administrative login from an unusual IP address would further increase the confidence of the alert, indicating a full attack chain from initial access to RCE.
CISA sets a deadline for federal agencies to apply patches or mitigations for CVE-2026-6973.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.