Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
970x120 Enterprise 1
Ivanti Takes Action: Zero-Day Flaws Affect Mobile Endpoint Manager

Ivanti Takes Action: Zero-Day Flaws Affect Mobile Endpoint Manager

30 January 2026 13:21

Ivanti has released a series of critical updates to address two security vulnerabilities affecting Ivanti Endpoint Manager Mobile (EPMM). These vulnerabilities are being actively exploited in zero-day attacks, prompting the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to immediately add one of the vulnerabilities to its catalog of known threats.

The technical picture is alarming: the vulnerabilities, identified as CVE-2026-1281 and CVE-2026-1340, have a CVSS score of 9.8. In less technical terms, these are code injection flaws that allow attackers to remotely execute code without any authentication.

Vulnerable versions and the limit of temporary patches

The issue affects a wide range of versions, from 12.5.0.0 to 12.7.0.0. While Ivanti has provided corrective patches in RPM format, the company has issued a crucial warning: these workarounds do not survive future version updates. In practice, if the appliance is updated, the patch must be manually reinstalled.

A final resolution is not expected until the release of version 12.8.0.0, scheduled for the end of the first quarter of 2026. Ivanti confirmed that it is aware of a limited number of customers already affected, but admitted that it does not yet have enough information on the attackers’ tactics to provide certain indicators of compromise.

Impact on systems and persistence risks

The vulnerabilities specifically affect internal app distribution functions and file transfer configuration on Android systems. Fortunately, the company has clarified that other products in its portfolio, including Ivanti Sentry and Ivanti Neurons for MDM, are not affected by the exposure.

Analysis reveals that attackers typically aim to establish persistence on compromised systems through the use of web shells and reverse shells. Once they gain control of the EPMM appliance, the risk extends to lateral movement across the entire corporate network and the exfiltration of sensitive data from managed mobile devices.

Audit Protocols for IT Administrators

To identify any intrusion attempts, Ivanti recommends analyzing Apache access logs. A suspicious sign is the presence of HTTP 404 response codes for specific attempts to access app distribution features, while legitimate traffic should typically return a 200.

In addition to analyzing technical logs, administrative control of the control panels is essential. Experts recommend monitoring for the possible appearance of new unauthorized administrator profiles or suspicious changes to the SSO and LDAP authentication systems that could indicate ongoing tampering.

Monitoring network configurations and policies

Audits must also extend to push applications and security policies sent to mobile devices. Any unplanned changes in the configuration of internal apps or corporate VPN settings should be considered a potential red flag of a breach.

While awaiting the final fix expected in March, human vigilance remains the last line of defense. Security managers are urged to carefully review every change to the network configuration and policies sent to mobile devices to prevent access to the EPMM from becoming an open door to the core of the infrastructure.

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

Cropped RHC 3d Transp2 1766828557 300x300
The Red Hot Cyber Editorial Team provides daily updates on bugs, data breaches, and global threats. Every piece of content is validated by our community of experts, including Pietro Melillo, Massimiliano Brolli, Sandro Sana, Olivia Terragni, and Stefano Gazzella. Through synergy with our industry-leading partners—such as Accenture, CrowdStrike, Trend Micro, and Fortinet—we transform technical complexity into collective awareness. We ensure information accuracy by analyzing primary sources and maintaining a rigorous technical peer-review process.