Ivanti warns of new EPMM flaw exploited in zero-day attacks

Ivanti warned customers today to patch a high-severity remote code execution vulnerability in Endpoint Manager Mobile (EPMM) exploited in zero-day attacks.

BleepingComputer

Ivanti Discloses High-Severity EPMM Flaw Exploited in Zero-Day Attacks

Ivanti has disclosed a high-severity flaw in its Endpoint Manager Mobile (EPMM) product, which has been exploited in limited zero-day attacks requiring admin authentication. To protect against this vulnerability, customers are advised to patch to Ivanti EPMM versions 12.6.1.1, 12.7.0.1, or 12.8.0.1.

https://osintsights.com/ivanti-discloses-high-severity-epmm-flaw-exploited-in-zero-day-attacks?utm_source=mastodon&utm_medium=social

#ZeroDay #Ivanti #Epmm #Cve20266973 #RemoteCodeExecution

Ivanti Discloses High-Severity EPMM Flaw Exploited in Zero-Day Attacks

Ivanti discloses high-severity EPMM flaw exploited in zero-day attacks learn how to patch now and protect your systems from potential threats immediately.

OSINTSights
CISA orders feds to patch exploited Ivanti EPMM flaw by Sunday

CISA has given U.S. government agencies four days to secure their systems against a critical-severity vulnerability in Ivanti Endpoint Manager Mobile (EPMM) that has been exploited in attacks since January.

BleepingComputer
Critical Vulnerabilities in Ivanti EPMM Exploited

We discuss widespread exploitation of Ivanti EPMM zero-day vulns CVE-2026-1281 and CVE-2026-1340. Attackers are deploying web shells and backdoors.

Unit 42
Dutch agencies hit by Ivanti EPMM exploit exposing employee contact data

Dutch agencies confirmed attacks exploiting Ivanti EPMM flaws that exposed employee contact data at the data protection authority and courts.

Security Affairs

If you have Ivanti EPMM, please follow these instructions.

https://hub.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US

“Technical Analysis updated with reliable Indicators of Compromise (IoC’s). Both in partnership with NCSC-NL.”

The Dutchies are at it again!🤘🇳🇱

#EPMM #CVE20261281 #CVE20261340 #Ivanti #Cybersecurity #infosec #ioc

Ivanti Innovators Hub

Only quickly popping on here from an otherwise very nice Fediverse vacation, because NCSC-NL has just put out an “assume-breach” warning. That’s… kinda big.

https://www.ncsc.nl/waarschuwing/ncsc-roept-organisaties-op-zich-te-melden-bij-gebruik-van-ivanti-endpoint-manager (Dutch)

#Ivanti #CVE20261281 #EPMM #MobileIron #NCSC_NL #Cybersecurity #infosec #IOC #NCSC

NCSC - Update: NCSC roept organisaties op zich te melden bij gebruik van Ivanti Endpoint Manager Mobile

Er is actief misbruik geconstateerd van een kwetsbaarheid in Ivanti Endpoint Manager Mobile (EPMM). Het NCSC roept organisaties die deze software gebruiken op om contact op te nemen.

📢 Ivanti publie des correctifs temporaires pour deux failles critiques EPMM, dont une zero‑day exploitée (CVE-2026-1281)
📝 Source: Help Net Security — Ivanti a publié des corr...
📖 cyberveille : https://cyberveille.ch/posts/2026-01-31-ivanti-publie-des-correctifs-temporaires-pour-deux-failles-critiques-epmm-dont-une-zero-day-exploitee-cve-2026-1281/
🌐 source : https://www.helpnetsecurity.com/2026/01/30/ivanti-epmm-cve-2026-1281-cve-2026-1340/
#CVE_2026_1281 #EPMM #Cyberveille
Ivanti publie des correctifs temporaires pour deux failles critiques EPMM, dont une zero‑day exploitée (CVE-2026-1281)

Source: Help Net Security — Ivanti a publié des correctifs provisoires pour deux vulnérabilités critiques touchant Endpoint Manager Mobile (EPMM), dont l’une est activement exploitée et listée par la CISA. 🚨 Vulnérabilités: CVE-2026-1281 (activement exploitée, ajoutée au catalogue KEV de la CISA) et CVE-2026-1340. 🧩 Nature des failles: injection de code affectant les fonctionnalités In-House Application Distribution et Android File Transfer Configuration d’EPMM. 🎯 Impact potentiel: exécution de code à distance (RCE) par des attaquants non authentifiés sur des installations on‑premises d’EPMM vulnérables. 🛠️ Mesure d’éditeur: publication de correctifs temporaires (provisional patches) pour atténuer ces failles critiques. Type d’article: patch de sécurité — objectif principal: annoncer des correctifs temporaires et alerter sur une exploitation active d’une vulnérabilité critique.

CyberVeille

Krytyczne luki w Ivanti EPMM – pilna aktualizacja dla bezpieczeństwa MDM

Masz w firmie serwer MDM wystawiony do internetu? Ktoś właśnie nauczył się nim sterować zdalnie – bez logowania.

Czytaj dalej:
https://pressmind.org/krytyczne-luki-w-ivanti-epmm-pilna-aktualizacja-dla-bezpieczenstwa-mdm/

#PressMindLabs #cve20261281 #cve20261340 #epmm #ivanti #mdm

Ivanti has disclosed two critical zero-day vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM) which allow RCE, tracked as CVE-2026-1281 and CVE-2026-1340. Both flaws are unauthenticated code injection issues that allow remote attackers to achieve arbitrary code execution on affected EPMM appliances. Active exploitation has been confirmed.

https://forum.hashpwn.net/post/9428

#cybersecurity #zeroday #rce #news #ivanti #cve #epmm #hashpwn