Skip to content
Go back

Ivanti EPMM: Two Pre-Auth RCEs Under Active Exploitation (CVE-2026-1281 / CVE-2026-1340)

Edit page

Two critical code injection vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM)CVE-2026-1281 and CVE-2026-1340 — are being exploited in the wild and can enable unauthenticated remote code execution on exposed appliances. (NVD)

TL;DR


What’s happening (practically)

EPMM is often reachable from the internet by design (mobile devices must talk to it). That makes it a classic “edge control plane” target: once exploitation starts, opportunistic activity tends to scale quickly — especially when PoCs become public. (CyberScoop)

Public reporting indicates limited attacks before Ivanti’s disclosure, followed by broader exploitation by multiple groups, with 1,400+ potentially vulnerable instances still exposed. (CyberScoop)


Why an EPMM compromise is a force multiplier

This isn’t just “server RCE.”

EPMM sits in the device trust + policy enforcement layer. If the platform is compromised, the downstream blast radius can include access to sensitive data, lateral movement opportunities, and potential control over managed devices — exactly the outcomes defenders try to prevent by deploying MDM/UEM in the first place. (circl.lu)

Deobfuscated take: Put EPMM in the same priority tier as identity infrastructure and remote access gateways. If it’s exposed and unpatched, assume it’s being probed.


Am I affected?

NHS England lists impacted versions across the 12.5 / 12.6 / 12.7 trains (and earlier in those trains). (NHS England Digital)

CIRCL also notes that older EoL versions may be affected. (circl.lu)


Immediate mitigation: patch fast (but don’t forget the “patch doesn’t stick” detail)

NHS England guidance is clear: apply Ivanti’s temporary RPM mitigation now. (NHS England Digital)

Two gotchas worth calling out:

  1. The RPM does not survive a version upgrade — if you upgrade later, you must reinstall the RPM. (NHS England Digital)
  2. A permanent fix is planned for EPMM 12.8.0.0. (NHS England Digital)

Compromise assessment: the fastest high-signal check

NHS England recommends reviewing the Apache access log:

They also highlight a practical heuristic:

They provide a regex you can use to quickly triage:

^(?!127\.0\.0\.1:\d+ .*$).*?\/mifs\/c\/(aft|app)store\/fob\/.*?404

Important: don’t rely only on local/on-box logs — NHS England notes on-box logging can be manipulated post-compromise and recommends reviewing data in your SIEM/log collector instead. (NHS England Digital)


If patching must wait: shrink exposure and buy time safely

If you truly can’t patch immediately, prioritize:


Edit page
Category:
Share this post on:

Previous Post
The Phases of AI-based Cyber Threats: Welcome to the Excitement Phase
Next Post
Notepad++ Supply Chain Compromise: Hunting for What the IOC Lists Miss