CVE-2026-1281

9.8 CRITICAL CISA KEV

📋 TL;DR

CVE-2026-1281 is a critical code injection vulnerability in Ivanti Endpoint Manager Mobile (EPMM) that allows unauthenticated attackers to execute arbitrary code remotely. This affects organizations using Ivanti EPMM for mobile device management. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • Ivanti Endpoint Manager Mobile (EPMM)
Versions: Versions prior to 11.10.0.3 and 11.9.1.2
Operating Systems: All supported OS for EPMM
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with vulnerable versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full control of the EPMM server, potentially compromising all managed mobile devices, stealing sensitive data, and using the server as a pivot point into the internal network.

🟠

Likely Case

Attackers deploy ransomware, install backdoors, or steal credentials and sensitive mobile device management data from the compromised server.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the EPMM server itself, though data exfiltration remains possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CISA confirms active exploitation in the wild. Attack requires no authentication and minimal technical skill.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.10.0.3 or 11.9.1.2

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340

Restart Required: Yes

Instructions:

1. Download the patch from Ivanti support portal. 2. Backup EPMM configuration and database. 3. Apply the patch following Ivanti's installation guide. 4. Restart the EPMM service. 5. Verify successful update via admin console.

🔧 Temporary Workarounds

Network Isolation

all

Restrict network access to EPMM server to only trusted IP addresses

Use firewall rules to block all inbound traffic except from required management IPs

🧯 If You Can't Patch

  • Immediately isolate the EPMM server from the internet and restrict internal network access
  • Implement strict monitoring for suspicious activity on the EPMM server and review all managed devices for compromise

🔍 How to Verify

Check if Vulnerable:

Check EPMM version in admin console under Help > About. If version is below 11.10.0.3 or 11.9.1.2, system is vulnerable.

Check Version:

Not applicable - use EPMM admin console interface

Verify Fix Applied:

After patching, verify version shows 11.10.0.3 or 11.9.1.2 or higher in admin console.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts to EPMM
  • Unexpected process execution on EPMM server
  • Suspicious network connections from EPMM server

Network Indicators:

  • Unusual outbound connections from EPMM server
  • Traffic to known malicious IPs from EPMM

SIEM Query:

source="epmm" AND (event_type="authentication_failure" OR process="unusual_executable")

🔗 References

📤 Share & Export