Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    What if the real risk of AI isn’t deepfakes — but daily whispers?

    Anthropic’s Claude grabs top spot in App Store after Trump’s ban

    AWS Middle East Central Down, apparently struck in war

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      What the polls say about how Americans are using AI

      February 27, 2026

      Tensions between the Pentagon and AI giant Anthropic reach a boiling point

      February 21, 2026

      Read the extended transcript: President Donald Trump interviewed by ‘NBC Nightly News’ anchor Tom Llamas

      February 6, 2026

      Stocks and bitcoin sink as investors dump software company shares

      February 4, 2026

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026
    • Business

      These ultra-budget laptops “include” 1.2TB storage, but most of it is OneDrive trial space

      March 1, 2026

      FCC approves the merger of cable giants Cox and Charter

      February 28, 2026

      Finding value with AI and Industry 5.0 transformation

      February 28, 2026

      How Smarsh built an AI front door for regulated industries — and drove 59% self-service adoption

      February 24, 2026

      Where MENA CIOs draw the line on AI sovereignty

      February 24, 2026
    • Crypto

      Bitcoin Bear Market Could Get Worse Despite the Latest Relief Rally

      March 1, 2026

      Crypto Scammers Have Been Quiet in February, Hacks Fall by 90%

      March 1, 2026

      Vitalik Buterin Signals Major Ethereum Wallet Overhaul

      March 1, 2026

      Why is Hyperliquid Price Rallying Amid the US-Iran War

      March 1, 2026

      Arbitrum Price Under Pressure: 60 Million ARB Whale Sale Sparks ATL Fear

      March 1, 2026
    • Technology

      What if the real risk of AI isn’t deepfakes — but daily whispers?

      March 1, 2026

      Anthropic’s Claude grabs top spot in App Store after Trump’s ban

      March 1, 2026

      AWS Middle East Central Down, apparently struck in war

      March 1, 2026

      A new account made over $515,000 betting on the U.S. strike against Iran

      March 1, 2026

      January in Servo: preloads, better forms, details styling, and more

      March 1, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Ivanti warns of two EPMM flaws exploited in zero-day attacks
    Technology

    Ivanti warns of two EPMM flaws exploited in zero-day attacks

    TechAiVerseBy TechAiVerseJanuary 30, 2026No Comments5 Mins Read4 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Ivanti warns of two EPMM flaws exploited in zero-day attacks
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Ivanti warns of two EPMM flaws exploited in zero-day attacks

    Ivanti has disclosed two critical vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE-2026-1281 and CVE-2026-1340, that were exploited in zero-day attacks.

    The flaws are code-injection vulnerabilities that allow remote attackers to execute arbitrary code on vulnerable devices without authentication. Both vulnerabilities have a CVSS score of 9.8 and are rated as critical.

    “We are aware of a very limited number of customers whose solution has been exploited at the time of disclosure,” warns Ivanti.

    Ivanti has released RPM scripts to mitigate the vulnerabilities for affected EPMM versions:

    • Use RPM 12.x.0.x for EPMM versions 12.5.0.x, 12.6.0.x, and 12.7.0.x
    • Use RPM 12.x.1.x for EPMM versions 12.5.1.0 and 12.6.1.0

    The company says there is no downtime required to apply the patches and that there is no functional impact, so it is strongly advised to apply them as soon as possible.

    However, the company does warn that the hotfixes do not survive a version upgrade and must be reapplied if the appliance is upgraded before a permanent fix is available.

    The vulnerabilities will be permanently fixed in EPMM version 12.8.0.0, which will be released later in Q1 2026.

    Ivanti says successful exploitation allows attackers to execute arbitrary code on the EPMM appliance, allowing attackers access to a wide range of information stored on the platform.

    This information includes administrator and user names, usernames, and email addresses, as well as information about managed mobile devices such as phone numbers, IP addresses, installed applications, and device identifiers like IMEI and MAC addresses.

    If location tracking is enabled, attackers could also access device location data, including GPS coordinates and locations of nearest cell towers.

    Ivanti warns that attackers could also use the EPMM API or web console to make configuration changes to devices, including authentication settings.

    Actively exploited zero-days

    Ivanti’s advisories state that both vulnerabilities were exploited as zero-days, but the company does not have reliable indicators of compromise (IOC) due to the small number of known impacted customers.

    However, the company has published technical guidance on detecting exploitation and post-exploitation behavior that admins can use.

    Ivanti says both vulnerabilities are triggered through the In-House Application Distribution and Android File Transfer Configuration features, with attempted or successful exploitation appearing in the Apache access log at /var/log/httpd/https-access_log.

    To help defenders identify suspicious activity, Ivanti provided a regular expression that can be used to look for exploitation activity in the access logs:

    ^(?!127.0.0.1:d+ .*$).*?/mifs/c/(aft|app)store/fob/.*?404

    The expression will list log entries that match external requests (not localhost traffic) targeting vulnerable endpoints that return 404 HTTP response codes.

    According to Ivanti, legitimate requests to these endpoints typically return an HTTP 200 response. Exploitation attempts, whether successful or attempted, return 404 errors, making these entries a strong indicator that a device has been targeted.

    However, Ivanti warns that once a device is compromised, attackers can modify or delete logs to hide their activity. If off-device logs are available, those should be reviewed instead.

    If a device is suspected of being compromised, Ivanti does not recommend that admins clean the system.

    Instead, customers should restore EPMM from a known-good backup taken before exploitation occurred or rebuild the appliance and migrate data to a replacement system.

    After restoring systems, Ivanity suggests performing these actions:

    • Reset the password of any local EPMM accounts. 
    • Reset the password for the LDAP and/or KDC service accounts that perform lookups. https://help.ivanti.com/mi/help/en_us/core/11.x/gsg/CoreGettingStarted/Configuring_LDAP_servers.htm 
    • Revoke and replace the public certificate used for your EPMM. 
    • Reset the password for any other internal or external service accounts configured with the EPMM solution. 

    While the vulnerabilities affect only Ivanti Endpoint Manager Mobile (EPMM), the company recommends reviewing Sentry logs as well.

    “While EPMM can be restricted to a DMZ with little to no access to the rest of a corporate network, Sentry is specifically intended to tunnel specific types of traffic from mobile devices to internal network assets,” reads Ivanti’s analysis guidance for CVE-2026-1281 & CVE-2026-1340.

    “If you suspect that your EPMM appliance is impacted, we recommend you review the systems that Sentry can access for potential recon or lateral movement.”

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-1281 to its Known Exploited Vulnerabilities (KEV) catalog, confirming that the flaw is being actively exploited.

    Federal civilian agencies have been given until February 1, 2026, to apply vendor mitigations or discontinue use of vulnerable systems under Binding Operational Directive 22-01.

    It is unclear why CISA did not add both vulnerabilities to the KEV, and BleepingComputer contacted Ivanti to confirm that both were exploited.

    In September, CISA published an analysis of malware kits deployed in attacks exploiting two other Ivanti Endpoint Manager Mobile (EPMM) zero-days. Those flaws were fixed in May 2025, but were previously exploited in zero-day attacks as well.

    7 Security Best Practices for MCP

    As MCP (Model Context Protocol) becomes the standard for connecting LLMs to tools and data, security teams are moving fast to keep these new services safe.

    This free cheat sheet outlines 7 best practices you can start using today.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleGoogle disrupts IPIDEA residential proxy networks fueled by malware
    Next Article Hugging Face abused to spread thousands of Android malware variants
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    What if the real risk of AI isn’t deepfakes — but daily whispers?

    March 1, 2026

    Anthropic’s Claude grabs top spot in App Store after Trump’s ban

    March 1, 2026

    AWS Middle East Central Down, apparently struck in war

    March 1, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025699 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025282 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025162 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025124 Views
    Don't Miss
    Technology March 1, 2026

    What if the real risk of AI isn’t deepfakes — but daily whispers?

    What if the real risk of AI isn’t deepfakes — but daily whispers? Vercel Security…

    Anthropic’s Claude grabs top spot in App Store after Trump’s ban

    AWS Middle East Central Down, apparently struck in war

    A new account made over $515,000 betting on the U.S. strike against Iran

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    What if the real risk of AI isn’t deepfakes — but daily whispers?

    March 1, 20261 Views

    Anthropic’s Claude grabs top spot in App Store after Trump’s ban

    March 1, 20263 Views

    AWS Middle East Central Down, apparently struck in war

    March 1, 20260 Views
    Most Popular

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views

    Best TV Antenna of 2025

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.