Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users

February 8, 2026

eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware

February 8, 2026

Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm

February 8, 2026
Facebook X (Twitter) Instagram
Sunday, February 8
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released
News

Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released

Team-CWDBy Team-CWDFebruary 6, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Ivanti has rolled out security updates to address two security flaws impacting Ivanti Endpoint Manager Mobile (EPMM) that have been exploited in zero-day attacks, one of which has been added by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to its Known Exploited Vulnerabilities (KEV) catalog.

The critical-severity vulnerabilities are listed below –

  • CVE-2026-1281 (CVSS score: 9.8) – A code injection allowing attackers to achieve unauthenticated remote code execution
  • CVE-2026-1340 (CVSS score: 9.8) – A code injection allowing attackers to achieve unauthenticated remote code execution

They affect the following versions –

  • EPMM 12.5.0.0 and prior, 12.6.0.0 and prior, and 12.7.0.0 and prior (Fixed in RPM 12.x.0.x)
  • EPMM 12.5.1.0 and prior and 12.6.1.0 and prior (Fixed in RPM 12.x.1.x)

However, it bears noting that the RPM patch does not survive a version upgrade and must be reapplied if the appliance is upgraded to a new version. The vulnerabilities will be permanently addressed in EPMM version 12.8.0.0, which will be released later in Q1 2026.

“We are aware of a very limited number of customers whose solution has been exploited at the time of disclosure,” Ivanti said in an advisory, adding it does not have enough information about the threat actor tactics to provide “reliable atomic indicators.”

The company noted that CVE-2026-1281 and CVE-2026-1340 affect the In-House Application Distribution and the Android File Transfer Configuration features. These shortcomings do not affect other products, including Ivanti Neurons for MDM, Ivanti Endpoint Manager (EPM), or Ivanti Sentry.

In a technical analysis, Ivanti said it has typically seen two forms of persistence based on prior attacks targeting older vulnerabilities in EPMM. This includes deploying web shells and reverse shells for setting up persistence on the compromised appliances.

“Successful exploitation of the EPMM appliance will enable arbitrary code execution on the appliance,” Ivanti noted. “Aside from lateral movement to the connected environment, EPMM also contains sensitive information about devices managed by the appliance.”

Users are advised to check the Apache access log at “/var/log/httpd/https-access_log” to look for signs of attempted or successful exploitation using the below regular expression (regex) pattern –

^(?!127.0.0.1:d+
.*$).*?/mifs/c/(aft|app)store/fob/.*?404

“Legitimate use of these capabilities will result in 200 HTTP response codes in the Apache access log, whereas successful or attempted exploitation will cause 404 HTTP response codes,” it explained.

In addition, customers are being asked to review the following to look for any evidence of unauthorized configuration changes –

  • EPMM administrators for new or recently changed administrators 
  • Authentication configuration, including SSO and LDAP settings
  • New push applications for mobile devices
  • Configuration changes to applications you push to devices, including in-house applications
  • New or recently modified policies
  • Network configuration changes, including any network configuration or VPN configuration you push to mobile devices

In the event signs of compromise are detected, Ivanti is also urging users to restore the EPMM device from a known good backup or build a replacement EPMM and then migrate data to the device. Once the steps are performed, it’s essential to make the following changes to secure the environment –

  • Reset the password of any local EPMM accounts
  • Reset the password for the LDAP and/or KDC service accounts that perform lookups
  • Revoke and replace the public certificate used for your EPMM
  • Reset the password for any other internal or external service accounts configured with the EPMM solution

The development has prompted CISA to add CVE-2026-1281 to the KEV catalog, requiring Federal Civilian Executive Branch (FCEB) agencies to apply the updates by February 1, 2026.

Update

In a report published January 30, 2026, researchers from watchTowr Labs said they reverse-engineered the patches, noting that the RPM fixes modify the Apache HTTPd config to replace two Bash shell scripts (“/mi/bin/map-appstore-url” and “/mi/bin/map-aft-store-url”) with newly introduced Java classes.

As a result, the cybersecurity company said, the vulnerability must be exploitable through HTTP, ultimately leading to a specially crafted HTTP GET request that could be used to pull it off –


GET /mifs/c/appstore/fob/3/5/sha256:kid=1,st=theValue%20%20,et=1337133713,
h=gPath%5B%60sleep%205%60%5D/e2327851-1e09-4463-9b5a-b524bc71fc07.ipa

This stems from the fact that the Bash script “/mi/bin/map-appstore-url” allows users to fetch mobile applications from the Ivanti EPMM-approved application store based on certain parameters, including –

  • The index of a salt string from “/mi/files/appstore-salt.txt” (kid)
  • Start time of the download operation (st)
  • End time of the download operation (et)
  • SHA256 hash (h), and
  • The app store file to retrieve (“e2327851-1e09-4463-9b5a-b524bc71fc07”)

In other words, sending an HTTP request to the endpoint “/mifs/c/appstore/fob/3//sha256:/.ipa” will cause Apache to execute the Bash script with the input: “___.ipa__“

“While patches are available from Ivanti, applying patches will not be enough – threat actors have been exploiting these vulnerabilities as zero-days, and organizations that are as of disclosure exposing vulnerable instances to the internet must consider them compromised, tear down infrastructure and instigate incident response processes,” watchTowr CEO Benjamin Harris said.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNew Password-Stealing Phishing Campaign Targets Dropbox Credentials
Next Article Chinese-Made Malware Kit Targets Chinese-Based Edge Devices
Team-CWD
  • Website

Related Posts

News

Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users

February 8, 2026
News

eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware

February 8, 2026
News

Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm

February 8, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

How it preys on personal data – and how to stay safe

October 23, 2025

‘What happens online stays online’ and other cyberbullying myths, debunked

September 11, 2025

Why you should never pay to get paid

September 15, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.