Fixing and finding
Jump to remediation plan
CVE ID

CVE-2026-1340

Published 2026-01-30
Updated last month
Vendor/s
Ivanti
Product/s
Endpoint Manager Mobile (EPMM)
Version/s
* > 12.7.0.0
KEV Status
Active Exploitation
Listed in CISA's Known Exploited Vulnerabilities catalogue. Active exploitation observed in the wild.
CVSS Score (v3.1)
9.8
/ 10
Critical
Severity Details
Base score
9.8 Critical
Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Description

CVE-2026-1340 is a critical 9.8 RCE vulnerability in Ivanti EPMM (up to 12.7.0.0). Actively exploited; immediate patching and mitigation are required.

CPE

Ivanti logo
Ivanti
Product Version Start Version End (excl.) Status
endpoint_manager_mobile * 12.7.0.0 vulnerable

Related weakness (CWE)

CWE-94

Remediation plan

1

Apply official patches

Immediately download and install the security updates provided by Ivanti, specifically the security-update RPM packages (e.g., version 1.1.0S-5 or 1.1.0L-5) designed to mitigate this code injection flaw.

2

Update affected systems

Upgrade all Ivanti Endpoint Manager Mobile (EPMM) instances running version 12.7.0.0 or earlier to the latest secure version specified in the Ivanti security advisory to ensure the vulnerability is fully remediated.

3

Restrict access

Minimize the attack surface by restricting access to EPMM management interfaces. Implement strict firewall rules to ensure only trusted IP addresses can reach the service and consider placing the product behind a VPN.

4

Monitor for exploitation

Actively scan for signs of compromise by reviewing system logs for unusual command execution, unauthorized file changes, or suspicious outbound network traffic originating from the EPMM server, which may indicate post-exploitation activity.

Detection Guidance

To detect potential exploitation of CVE-2026-1340, security teams should monitor web server logs for suspicious HTTP POST requests containing unexpected scripts or shell commands. Look for indicators of CWE-94 code injection, such as unusual characters or system-level commands in application input fields. Additionally, check for the creation of unauthorized web shells or new administrative users, and use network-based IDS signatures to identify unauthenticated traffic patterns targeting known EPMM vulnerabilities.

References

Sources

NIST National Vulnerability Database (NVD)
CISA Known Exploited Vulnerabilities (KEV)

Experience superior visibility and a simpler approach to cyber risk management