Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Creators eye Snapchat as a reliable income alternative to TikTok and YouTube

    Future of TV Briefing: WTF is server-guided ad insertion?

    ‘Agentic with a small a’: CMOs are adopting AI more slowly than it’s evolving

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Read the extended transcript: President Donald Trump interviewed by ‘NBC Nightly News’ anchor Tom Llamas

      February 6, 2026

      Stocks and bitcoin sink as investors dump software company shares

      February 4, 2026

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026

      To avoid accusations of AI cheating, college students are turning to AI

      January 29, 2026

      ChatGPT can embrace authoritarian ideas after just one prompt, researchers say

      January 24, 2026
    • Business

      The HDD brand that brought you the 1.8-inch, 2.5-inch, and 3.5-inch hard drives is now back with a $19 pocket-sized personal cloud for your smartphones

      February 12, 2026

      New VoidLink malware framework targets Linux cloud servers

      January 14, 2026

      Nvidia Rubin’s rack-scale encryption signals a turning point for enterprise AI security

      January 13, 2026

      How KPMG is redefining the future of SAP consulting on a global scale

      January 10, 2026

      Top 10 cloud computing stories of 2025

      December 22, 2025
    • Crypto

      Wall Street Moves Into Prediction Markets With Election-Contract ETF Filings

      February 18, 2026

      Tectonic to Host Inaugural Quantum Summit at ETHDenver 2026 Focused on Post-Quantum Cryptography Readiness for Web3

      February 18, 2026

      Ki Young Ju Says Bitcoin May Need to Hit $55K Before True Recovery Begins

      February 18, 2026

      MYX Finance Is Oversold For The First Time Ever, Yet No Relief In Sight

      February 18, 2026

      Everyone is Talking about the SaaSpocalypse, But Why Does it matter for Crypto?

      February 18, 2026
    • Technology

      Creators eye Snapchat as a reliable income alternative to TikTok and YouTube

      February 18, 2026

      Future of TV Briefing: WTF is server-guided ad insertion?

      February 18, 2026

      ‘Agentic with a small a’: CMOs are adopting AI more slowly than it’s evolving

      February 18, 2026

      The best drone for 2026

      February 18, 2026

      YouTube was down for thousands of users in the US

      February 18, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Ivanti warns of two EPMM flaws exploited in zero-day attacks
    Technology

    Ivanti warns of two EPMM flaws exploited in zero-day attacks

    TechAiVerseBy TechAiVerseJanuary 30, 2026No Comments5 Mins Read2 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Ivanti warns of two EPMM flaws exploited in zero-day attacks
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Ivanti warns of two EPMM flaws exploited in zero-day attacks

    Ivanti has disclosed two critical vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE-2026-1281 and CVE-2026-1340, that were exploited in zero-day attacks.

    The flaws are code-injection vulnerabilities that allow remote attackers to execute arbitrary code on vulnerable devices without authentication. Both vulnerabilities have a CVSS score of 9.8 and are rated as critical.

    “We are aware of a very limited number of customers whose solution has been exploited at the time of disclosure,” warns Ivanti.

    Ivanti has released RPM scripts to mitigate the vulnerabilities for affected EPMM versions:

    • Use RPM 12.x.0.x for EPMM versions 12.5.0.x, 12.6.0.x, and 12.7.0.x
    • Use RPM 12.x.1.x for EPMM versions 12.5.1.0 and 12.6.1.0

    The company says there is no downtime required to apply the patches and that there is no functional impact, so it is strongly advised to apply them as soon as possible.

    However, the company does warn that the hotfixes do not survive a version upgrade and must be reapplied if the appliance is upgraded before a permanent fix is available.

    The vulnerabilities will be permanently fixed in EPMM version 12.8.0.0, which will be released later in Q1 2026.

    Ivanti says successful exploitation allows attackers to execute arbitrary code on the EPMM appliance, allowing attackers access to a wide range of information stored on the platform.

    This information includes administrator and user names, usernames, and email addresses, as well as information about managed mobile devices such as phone numbers, IP addresses, installed applications, and device identifiers like IMEI and MAC addresses.

    If location tracking is enabled, attackers could also access device location data, including GPS coordinates and locations of nearest cell towers.

    Ivanti warns that attackers could also use the EPMM API or web console to make configuration changes to devices, including authentication settings.

    Actively exploited zero-days

    Ivanti’s advisories state that both vulnerabilities were exploited as zero-days, but the company does not have reliable indicators of compromise (IOC) due to the small number of known impacted customers.

    However, the company has published technical guidance on detecting exploitation and post-exploitation behavior that admins can use.

    Ivanti says both vulnerabilities are triggered through the In-House Application Distribution and Android File Transfer Configuration features, with attempted or successful exploitation appearing in the Apache access log at /var/log/httpd/https-access_log.

    To help defenders identify suspicious activity, Ivanti provided a regular expression that can be used to look for exploitation activity in the access logs:

    ^(?!127.0.0.1:d+ .*$).*?/mifs/c/(aft|app)store/fob/.*?404

    The expression will list log entries that match external requests (not localhost traffic) targeting vulnerable endpoints that return 404 HTTP response codes.

    According to Ivanti, legitimate requests to these endpoints typically return an HTTP 200 response. Exploitation attempts, whether successful or attempted, return 404 errors, making these entries a strong indicator that a device has been targeted.

    However, Ivanti warns that once a device is compromised, attackers can modify or delete logs to hide their activity. If off-device logs are available, those should be reviewed instead.

    If a device is suspected of being compromised, Ivanti does not recommend that admins clean the system.

    Instead, customers should restore EPMM from a known-good backup taken before exploitation occurred or rebuild the appliance and migrate data to a replacement system.

    After restoring systems, Ivanity suggests performing these actions:

    • Reset the password of any local EPMM accounts. 
    • Reset the password for the LDAP and/or KDC service accounts that perform lookups. https://help.ivanti.com/mi/help/en_us/core/11.x/gsg/CoreGettingStarted/Configuring_LDAP_servers.htm 
    • Revoke and replace the public certificate used for your EPMM. 
    • Reset the password for any other internal or external service accounts configured with the EPMM solution. 

    While the vulnerabilities affect only Ivanti Endpoint Manager Mobile (EPMM), the company recommends reviewing Sentry logs as well.

    “While EPMM can be restricted to a DMZ with little to no access to the rest of a corporate network, Sentry is specifically intended to tunnel specific types of traffic from mobile devices to internal network assets,” reads Ivanti’s analysis guidance for CVE-2026-1281 & CVE-2026-1340.

    “If you suspect that your EPMM appliance is impacted, we recommend you review the systems that Sentry can access for potential recon or lateral movement.”

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-1281 to its Known Exploited Vulnerabilities (KEV) catalog, confirming that the flaw is being actively exploited.

    Federal civilian agencies have been given until February 1, 2026, to apply vendor mitigations or discontinue use of vulnerable systems under Binding Operational Directive 22-01.

    It is unclear why CISA did not add both vulnerabilities to the KEV, and BleepingComputer contacted Ivanti to confirm that both were exploited.

    In September, CISA published an analysis of malware kits deployed in attacks exploiting two other Ivanti Endpoint Manager Mobile (EPMM) zero-days. Those flaws were fixed in May 2025, but were previously exploited in zero-day attacks as well.

    7 Security Best Practices for MCP

    As MCP (Model Context Protocol) becomes the standard for connecting LLMs to tools and data, security teams are moving fast to keep these new services safe.

    This free cheat sheet outlines 7 best practices you can start using today.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleGoogle disrupts IPIDEA residential proxy networks fueled by malware
    Next Article Hugging Face abused to spread thousands of Android malware variants
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Creators eye Snapchat as a reliable income alternative to TikTok and YouTube

    February 18, 2026

    Future of TV Briefing: WTF is server-guided ad insertion?

    February 18, 2026

    ‘Agentic with a small a’: CMOs are adopting AI more slowly than it’s evolving

    February 18, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025683 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025270 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025155 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025114 Views
    Don't Miss
    Technology February 18, 2026

    Creators eye Snapchat as a reliable income alternative to TikTok and YouTube

    Creators eye Snapchat as a reliable income alternative to TikTok and YouTube“I have days that…

    Future of TV Briefing: WTF is server-guided ad insertion?

    ‘Agentic with a small a’: CMOs are adopting AI more slowly than it’s evolving

    Tencent’s TiMi Studio Group reportedly funded Highguard dev Wildlight Entertainment

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Creators eye Snapchat as a reliable income alternative to TikTok and YouTube

    February 18, 20260 Views

    Future of TV Briefing: WTF is server-guided ad insertion?

    February 18, 20260 Views

    ‘Agentic with a small a’: CMOs are adopting AI more slowly than it’s evolving

    February 18, 20260 Views
    Most Popular

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views

    This new Roomba finally solves the big problem I have with robot vacuums

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.