Ivanti has disclosed two critical vulnerabilities, CVE-2026-1281 and CVE-2026-1340, in its Endpoint Manager Mobile (EPMM) product, formerly known as MobileIron Core. Both vulnerabilities have a CVSS score of 9.8, reflecting their extreme severity. Crucially, Ivanti and Singapore's Cyber Security Agency (CSA) have confirmed that these flaws are being actively exploited in the wild as zero-day attacks. Successful exploitation allows an unauthenticated remote attacker to execute arbitrary code on the EPMM appliance. This provides a direct pathway to compromise the central management point for an organization's mobile devices, potentially exposing vast amounts of sensitive corporate and personal data. Organizations using affected versions of EPMM are strongly advised to apply the provided patches immediately.
The technical specifics of the vulnerabilities have not been fully disclosed by Ivanti to prevent wider exploitation. However, their nature as unauthenticated RCE flaws means an attacker does not need any credentials or prior access to the target system. They can be exploited over the network, likely by sending a specially crafted request to an exposed API endpoint on the EPMM server. This type of vulnerability is highly sought after by threat actors as it provides a direct and often easy path to initial access.
The vulnerabilities impact the following versions of Ivanti Endpoint Manager Mobile (EPMM):
12.5.0.x12.6.0.x12.7.0.x12.5.1.0 (Specific build)12.6.1.0 (Specific build)Organizations running any of these versions on their appliances are considered vulnerable and should take immediate action.
Both vulnerabilities are confirmed to be under active exploitation in the wild. This has been corroborated by both Ivanti and the Cyber Security Agency of Singapore. The designation of these flaws as zero-days indicates that attackers were exploiting them before patches were available. This elevates the urgency for patching to the highest level, as active, weaponized exploits are already in circulation. The exploitation likely falls under T1190 - Exploit Public-Facing Application.
The impact of exploiting these vulnerabilities is severe. An EPMM server is a highly privileged asset within an organization's infrastructure, as it manages, secures, and inventories the entire fleet of mobile devices (smartphones and tablets).
root or SYSTEM user.While specific IOCs are not public, defenders should hunt for signs of exploitation on their EPMM appliances:
log_sourceEPMM / MobileIron Core web server logsprocess_name(Anomalous processes)bash, sh, powershell.exe, cmd.exe).network_traffic_patternOutbound connections from EPMMfile_path/tmp/, /var/tmp/Given the active exploitation, rapid detection is critical.
4xx or 5xx error codes that could indicate failed exploit attempts, or 200 OK responses for unexpected endpoints. Look for requests from untrusted IP addresses.If a compromise is suspected, isolate the appliance from the network immediately and initiate incident response procedures.
Immediate patching is the only effective remediation.
Important: Ivanti has noted that these are temporary hotfixes. They must be reapplied if the appliance is upgraded to a new minor version before the permanent fix is released.
12.8.0.0 as soon as it is released, as this will contain the permanent fix for these vulnerabilities.European Commission, Dutch, and Finnish government agencies confirm breaches linked to Ivanti EPMM zero-days; over 50 servers compromised globally.
The primary mitigation is to apply the security patches provided by Ivanti immediately to prevent exploitation.
Restrict network access to the EPMM management interface to only trusted internal IP ranges, reducing the attack surface available to external threats.
Implement strict egress filtering to block unexpected outbound connections from the EPMM appliance, which can prevent C2 communication after a successful compromise.
The immediate and most critical action is to apply the RPM script patches provided by Ivanti. Given that these are actively exploited zero-day vulnerabilities, the patching process should be treated as an emergency change. Organizations must bypass standard, lengthy testing cycles and deploy the fix to all internet-facing EPMM appliances immediately, followed by internal ones. It is crucial to identify all affected instances of EPMM, including those in development or staging environments, as they can also serve as entry points. A robust asset inventory is a prerequisite for this. After patching, teams must verify successful application by checking the installed RPM versions. Furthermore, a plan must be established to deploy the permanent fix in EPMM version 12.8.0.0 as soon as it becomes available, as the current patches are temporary hotfixes.
As a critical compensating control, organizations must implement strict inbound traffic filtering for their EPMM appliances. The management interfaces for these systems should never be exposed directly to the public internet. Access should be restricted at the network edge (perimeter firewall or cloud security group) to a tightly controlled allowlist of IP addresses. This list should only include corporate VPN gateways and trusted internal administrative subnets. This action dramatically reduces the attack surface, making it impossible for a remote, unauthenticated attacker to reach the vulnerable endpoints. If business requirements necessitate broader access, consider placing the service behind a Web Application Firewall (WAF) with a specific ruleset designed to inspect and block malicious requests targeting Ivanti products, although this is a secondary defense compared to network-level access restriction.
Ivanti and the CSA of Singapore release advisories about two critical, actively exploited vulnerabilities in EPMM.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.