Ivanti has disclosed two critical vulnerabilities, CVE-2026-1281 and CVE-2026-1340, in its Endpoint Manager Mobile (EPMM) product, formerly known as MobileIron Core. Both vulnerabilities have a CVSS score of 9.8, reflecting their extreme severity. Crucially, Ivanti and Singapore's Cyber Security Agency (CSA) have confirmed that these flaws are being actively exploited in the wild as zero-day attacks. Successful exploitation allows an unauthenticated remote attacker to execute arbitrary code on the EPMM appliance. This provides a direct pathway to compromise the central management point for an organization's mobile devices, potentially exposing vast amounts of sensitive corporate and personal data. Organizations using affected versions of EPMM are strongly advised to apply the provided patches immediately.
The technical specifics of the vulnerabilities have not been fully disclosed by Ivanti to prevent wider exploitation. However, their nature as unauthenticated RCE flaws means an attacker does not need any credentials or prior access to the target system. They can be exploited over the network, likely by sending a specially crafted request to an exposed API endpoint on the EPMM server. This type of vulnerability is highly sought after by threat actors as it provides a direct and often easy path to initial access.
The vulnerabilities impact the following versions of Ivanti Endpoint Manager Mobile (EPMM):
12.5.0.x12.6.0.x12.7.0.x12.5.1.0 (Specific build)12.6.1.0 (Specific build)Organizations running any of these versions on their appliances are considered vulnerable and should take immediate action.
Both vulnerabilities are confirmed to be under active exploitation in the wild. This has been corroborated by both Ivanti and the Cyber Security Agency of Singapore. The designation of these flaws as zero-days indicates that attackers were exploiting them before patches were available. This elevates the urgency for patching to the highest level, as active, weaponized exploits are already in circulation. The exploitation likely falls under T1190 - Exploit Public-Facing Application.
The impact of exploiting these vulnerabilities is severe. An EPMM server is a highly privileged asset within an organization's infrastructure, as it manages, secures, and inventories the entire fleet of mobile devices (smartphones and tablets).
root or SYSTEM user.While specific IOCs are not public, defenders should hunt for signs of exploitation on their EPMM appliances:
| Type | Value | Description |
|---|---|---|
log_source |
EPMM / MobileIron Core web server logs |
Monitor for unusual or malformed requests to web application endpoints, especially from unknown IP addresses. |
process_name |
(Anomalous processes) |
Look for unexpected processes spawning from the main EPMM web service process (e.g., bash, sh, powershell.exe, cmd.exe). |
network_traffic_pattern |
Outbound connections from EPMM |
EPMM appliances should generally not initiate outbound connections to arbitrary internet hosts. Monitor for any such connections, especially over common C2 channels (e.g., ports 443, 80, 53 to non-standard servers). |
file_path |
/tmp/, /var/tmp/ |
Monitor for newly created executable files or web shells in temporary directories on the appliance. |
Given the active exploitation, rapid detection is critical.
4xx or 5xx error codes that could indicate failed exploit attempts, or 200 OK responses for unexpected endpoints. Look for requests from untrusted IP addresses.If a compromise is suspected, isolate the appliance from the network immediately and initiate incident response procedures.
Immediate patching is the only effective remediation.
Important: Ivanti has noted that these are temporary hotfixes. They must be reapplied if the appliance is upgraded to a new minor version before the permanent fix is released.
12.8.0.0 as soon as it is released, as this will contain the permanent fix for these vulnerabilities.European Commission, Dutch, and Finnish government agencies confirm breaches linked to Ivanti EPMM zero-days; over 50 servers compromised globally.
The European Commission is investigating a cyberattack on its MDM system, suspected to be linked to the Ivanti EPMM zero-days (CVE-2026-1281, CVE-2026-1340). The Dutch Authority for the Protection of Personal Data and a Finnish government agency (Valtori) have confirmed breaches affecting employee data and up to 50,000 users, respectively, due to these vulnerabilities. Security watchdog Shadowserver has identified over 50 compromised Ivanti EPMM servers worldwide, indicating widespread active exploitation. Ivanti has also released an integrity checker tool and IOCs to aid detection.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats