Article Details
Scrape Timestamp (UTC): 2026-01-30 04:48:17.642
Source: https://thehackernews.com/2026/01/two-ivanti-epmm-zero-day-rce-flaws.html
Original Article Text
Click to Toggle View
Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released. Ivanti has rolled out security updates to address two security flaws impacting Ivanti Endpoint Manager Mobile (EPMM) that have been exploited in zero-day attacks, one of which has been added by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to its Known Exploited Vulnerabilities (KEV) catalog. The critical-severity vulnerabilities are listed below - They affect the following versions - However, it bears noting that the RPM patch does not survive a version upgrade and must be reapplied if the appliance is upgraded to a new version. The vulnerabilities will be permanently addressed in EPMM version 12.8.0.0, which will be released later in Q1 2026. "We are aware of a very limited number of customers whose solution has been exploited at the time of disclosure," Ivanti said in an advisory, adding it does not have enough information about the threat actor tactics to provide proven, reliable atomic indicators." The company noted that CVE-2026-1281 and CVE-2026-1340 affect the In-House Application Distribution and the Android File Transfer Configuration features. These shortcomings do not affect other products, including Ivanti Neurons for MDM, Ivanti Endpoint Manager (EPM), or Ivanti Sentry. In a technical analysis, Ivanti said it has typically seen two forms of persistence based on prior attacks targeting older vulnerabilities in EPMM. This includes deploying web shells and reverse shells for setting up persistence on the compromised appliances. "Successful exploitation of the EPMM appliance will enable arbitrary code execution on the appliance," Ivanti noted. "Aside from lateral movement to the connected environment, EPMM also contains sensitive information about devices managed by the appliance." Users are advised to check the Apache access log at "/var/log/httpd/https-access_log" to look for signs of attempted or successful exploitation using the below regular expression (regex) pattern - "Legitimate use of these capabilities will result in 200 HTTP response codes in the Apache Access Log, whereas successful or attempted exploitation will cause 404 HTTP response codes," it explained. In addition, customers are being asked to review the following to look for any evidence of unauthorized configuration changes - In the event signs of compromise are detected, Ivanti is also urging users to restore the EPMM device from a known good backup or build a replacement EPMM and then migrate data to the device. Once the steps are performed, it's essential to make the following changes to secure the environment - The development has prompted CISA to add CVE-2026-1281 to the KEV catalog, requiring Federal Civilian Executive Branch (FCEB) agencies to apply the updates by February 1, 2026.
Daily Brief Summary
Ivanti has issued security updates for two zero-day vulnerabilities in its Endpoint Manager Mobile (EPMM) software, actively exploited and now listed in CISA's Known Exploited Vulnerabilities catalog.
The vulnerabilities, CVE-2026-1281 and CVE-2026-1340, impact the In-House Application Distribution and Android File Transfer Configuration features, posing a critical risk to affected systems.
Successful exploitation allows arbitrary code execution and potential lateral movement within connected environments, with sensitive device information at risk.
Ivanti advises users to monitor Apache access logs for 404 HTTP response codes, indicating potential exploitation attempts, and to review system configurations for unauthorized changes.
Affected users are urged to apply the RPM patch, which must be reapplied after version upgrades, until a permanent fix is available in EPMM version 12.8.0.0, slated for release in Q1 2026.
In cases of detected compromise, Ivanti recommends restoring affected devices from a known good backup or rebuilding and migrating data to a new EPMM device.
CISA mandates Federal Civilian Executive Branch agencies to implement the updates by February 1, 2026, to mitigate potential threats.